The Change Password dialog box (change_password) in Sophos Web Appliance before 3.8.2 allows remote authenticated users to change the admin user password via a crafted request.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
The Change Password dialog box (change_password) in Sophos Web Appliance before 3.8.2 allows remote authenticated users to change the admin user password via a crafted request.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.securityfocus.com/bid/66734 | vdb-entry x_refsource_BID |
http://www.sophos.com/en-us/support/knowledgebase/120230.aspx | x_refsource_CONFIRM |
http://www.zerodayinitiative.com/advisories/ZDI-14-069/ | x_refsource_MISC |
http://www.exploit-db.com/exploits/32789 | exploit x_refsource_EXPLOIT-DB |
http://secunia.com/advisories/57706 | third-party-advisory x_refsource_SECUNIA |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.securityfocus.com/bid/66734 | vdb-entry x_refsource_BID x_transferred |
http://www.sophos.com/en-us/support/knowledgebase/120230.aspx | x_refsource_CONFIRM x_transferred |
http://www.zerodayinitiative.com/advisories/ZDI-14-069/ | x_refsource_MISC x_transferred |
http://www.exploit-db.com/exploits/32789 | exploit x_refsource_EXPLOIT-DB x_transferred |
http://secunia.com/advisories/57706 | third-party-advisory x_refsource_SECUNIA x_transferred |
The Change Password dialog box (change_password) in Sophos Web Appliance before 3.8.2 allows remote authenticated users to change the admin user password via a crafted request.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 8.5 | HIGH | AV:N/AC:L/Au:S/C:N/I:C/A:C |
Hyperlink | Source | Resource |
---|---|---|
http://secunia.com/advisories/57706 | cve@mitre.org | Vendor Advisory |
http://www.exploit-db.com/exploits/32789 | cve@mitre.org | Exploit |
http://www.securityfocus.com/bid/66734 | cve@mitre.org | Exploit |
http://www.sophos.com/en-us/support/knowledgebase/120230.aspx | cve@mitre.org | Vendor Advisory |
http://www.zerodayinitiative.com/advisories/ZDI-14-069/ | cve@mitre.org | N/A |
http://secunia.com/advisories/57706 | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
http://www.exploit-db.com/exploits/32789 | af854a3a-2127-422b-91ae-364da2661108 | Exploit |
http://www.securityfocus.com/bid/66734 | af854a3a-2127-422b-91ae-364da2661108 | Exploit |
http://www.sophos.com/en-us/support/knowledgebase/120230.aspx | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
http://www.zerodayinitiative.com/advisories/ZDI-14-069/ | af854a3a-2127-422b-91ae-364da2661108 | N/A |