Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2020-12503

Summary
Assigner-CERTVDE
Assigner Org ID-270ccfa6-a436-4e77-922e-914ec3a9685c
Published At-15 Oct, 2020 | 18:42
Updated At-17 Sep, 2024 | 04:24
Rejected At-
Credits

Pepperl+Fuchs improper authorization affects multiple Comtrol RocketLinx products

Improper Authorization vulnerability of Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, ES9528/ES9528-XT (all versions) and ICRL-M-8RJ45/4SFP-G-DIN, ICRL-M-16RJ45/4CP-G-DIN FW 1.2.3 and below is prone to multiple authenticated command injections.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:CERTVDE
Assigner Org ID:270ccfa6-a436-4e77-922e-914ec3a9685c
Published At:15 Oct, 2020 | 18:42
Updated At:17 Sep, 2024 | 04:24
Rejected At:
▼CVE Numbering Authority (CNA)
Pepperl+Fuchs improper authorization affects multiple Comtrol RocketLinx products

Improper Authorization vulnerability of Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, ES9528/ES9528-XT (all versions) and ICRL-M-8RJ45/4SFP-G-DIN, ICRL-M-16RJ45/4CP-G-DIN FW 1.2.3 and below is prone to multiple authenticated command injections.

Affected Products
Vendor
Pepperl+Fuchs
Product
P+F Comtrol RocketLinx
Versions
Affected
  • ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510-XTE, ES9528/ES9528-XT all
  • From ES7510-XT before 2.1.1 (custom)
  • From ES8510 before 3.1.1 (custom)
Vendor
Pepperl+Fuchs
Product
P+F Comtrol RocketLinx
Versions
Affected
  • From ICRL-M-8RJ45/4SFP-G-DIN through 1.2.3 (custom)
  • From ICRL-M-16RJ45/4CP-G-DIN through 1.2.3 (custom)
Vendor
Korenix
Product
JetNet
Versions
Affected
  • From 5428G-20SFP through V1.0 (custom)
  • From 5810G through V1.1 (custom)
  • From 4706F through V2.3b (custom)
  • From 4510 through V3.0b (custom)
  • From 5310 before V1.6 (custom)
Vendor
Westermo
Product
PMI-110-F2G
Versions
Affected
  • From unspecified before V1.8 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-863CWE-863 Incorrect Authorization
Type: CWE
CWE ID: CWE-863
Description: CWE-863 Incorrect Authorization
Metrics
VersionBase scoreBase severityVector
3.17.2HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

An external protective measure is required. 1) Traffic from untrusted networks to the device should be blocked by a firewall. Especially traffic targeting the administration webpage. 2) Administrator and user access should be protected by a secure password and only be available to a very limited group of people.

Configurations

Workarounds

Exploits

Credits

T. Weber (SEC Consult Vulnerability Lab)
Coordinated by CERT@VDE
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://cert.vde.com/de-de/advisories/vde-2020-040
x_refsource_CONFIRM
http://seclists.org/fulldisclosure/2021/Jun/0
mailing-list
x_refsource_FULLDISC
http://packetstormsecurity.com/files/162903/Korenix-CSRF-Backdoor-Accounts-Command-Injection-Missing-Authentication.html
x_refsource_MISC
https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-korenix-technology-westermo-pepperl-fuchs/
x_refsource_CONFIRM
https://cert.vde.com/en-us/advisories/vde-2020-053
x_refsource_CONFIRM
http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html
x_refsource_MISC
Hyperlink: https://cert.vde.com/de-de/advisories/vde-2020-040
Resource:
x_refsource_CONFIRM
Hyperlink: http://seclists.org/fulldisclosure/2021/Jun/0
Resource:
mailing-list
x_refsource_FULLDISC
Hyperlink: http://packetstormsecurity.com/files/162903/Korenix-CSRF-Backdoor-Accounts-Command-Injection-Missing-Authentication.html
Resource:
x_refsource_MISC
Hyperlink: https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-korenix-technology-westermo-pepperl-fuchs/
Resource:
x_refsource_CONFIRM
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2020-053
Resource:
x_refsource_CONFIRM
Hyperlink: http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://cert.vde.com/de-de/advisories/vde-2020-040
x_refsource_CONFIRM
x_transferred
http://seclists.org/fulldisclosure/2021/Jun/0
mailing-list
x_refsource_FULLDISC
x_transferred
http://packetstormsecurity.com/files/162903/Korenix-CSRF-Backdoor-Accounts-Command-Injection-Missing-Authentication.html
x_refsource_MISC
x_transferred
https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-korenix-technology-westermo-pepperl-fuchs/
x_refsource_CONFIRM
x_transferred
https://cert.vde.com/en-us/advisories/vde-2020-053
x_refsource_CONFIRM
x_transferred
http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html
x_refsource_MISC
x_transferred
Hyperlink: https://cert.vde.com/de-de/advisories/vde-2020-040
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://seclists.org/fulldisclosure/2021/Jun/0
Resource:
mailing-list
x_refsource_FULLDISC
x_transferred
Hyperlink: http://packetstormsecurity.com/files/162903/Korenix-CSRF-Backdoor-Accounts-Command-Injection-Missing-Authentication.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-korenix-technology-westermo-pepperl-fuchs/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2020-053
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:info@cert.vde.com
Published At:15 Oct, 2020 | 19:15
Updated At:29 Apr, 2022 | 15:29

Improper Authorization vulnerability of Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, ES9528/ES9528-XT (all versions) and ICRL-M-8RJ45/4SFP-G-DIN, ICRL-M-16RJ45/4CP-G-DIN FW 1.2.3 and below is prone to multiple authenticated command injections.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.2HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Secondary3.17.2HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Primary2.06.5MEDIUM
AV:N/AC:L/Au:S/C:P/I:P/A:P
Type: Primary
Version: 3.1
Base score: 7.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 7.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 6.5
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:S/C:P/I:P/A:P
CPE Matches

pepperl-fuchs
pepperl-fuchs
>>es7510-xt_firmware>>*
cpe:2.3:o:pepperl-fuchs:es7510-xt_firmware:*:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>es7510-xt>>-
cpe:2.3:h:pepperl-fuchs:es7510-xt:-:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>es8509-xt_firmware>>*
cpe:2.3:o:pepperl-fuchs:es8509-xt_firmware:*:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>es8509-xt>>-
cpe:2.3:h:pepperl-fuchs:es8509-xt:-:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>es8510-xt_firmware>>*
cpe:2.3:o:pepperl-fuchs:es8510-xt_firmware:*:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>es8510-xt>>-
cpe:2.3:h:pepperl-fuchs:es8510-xt:-:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>es9528-xtv2_firmware>>*
cpe:2.3:o:pepperl-fuchs:es9528-xtv2_firmware:*:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>es9528-xtv2>>-
cpe:2.3:h:pepperl-fuchs:es9528-xtv2:-:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>es7506_firmware>>*
cpe:2.3:o:pepperl-fuchs:es7506_firmware:*:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>es7506>>-
cpe:2.3:h:pepperl-fuchs:es7506:-:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>es7510_firmware>>*
cpe:2.3:o:pepperl-fuchs:es7510_firmware:*:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>es7510>>-
cpe:2.3:h:pepperl-fuchs:es7510:-:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>es7528_firmware>>*
cpe:2.3:o:pepperl-fuchs:es7528_firmware:*:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>es7528>>-
cpe:2.3:h:pepperl-fuchs:es7528:-:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>es8508_firmware>>*
cpe:2.3:o:pepperl-fuchs:es8508_firmware:*:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>es8508>>-
cpe:2.3:h:pepperl-fuchs:es8508:-:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>es8508f_firmware>>*
cpe:2.3:o:pepperl-fuchs:es8508f_firmware:*:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>es8508f>>-
cpe:2.3:h:pepperl-fuchs:es8508f:-:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>es8510_firmware>>*
cpe:2.3:o:pepperl-fuchs:es8510_firmware:*:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>es8510>>-
cpe:2.3:h:pepperl-fuchs:es8510:-:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>es8510-xte_firmware>>*
cpe:2.3:o:pepperl-fuchs:es8510-xte_firmware:*:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>es8510-xte>>-
cpe:2.3:h:pepperl-fuchs:es8510-xte:-:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>es9528_firmware>>*
cpe:2.3:o:pepperl-fuchs:es9528_firmware:*:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>es9528>>-
cpe:2.3:h:pepperl-fuchs:es9528:-:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>es9528-xt_firmware>>*
cpe:2.3:o:pepperl-fuchs:es9528-xt_firmware:*:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>es9528-xt>>-
cpe:2.3:h:pepperl-fuchs:es9528-xt:-:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>icrl-m-8rj45\/4sfp-g-din_firmware>>Versions up to 1.3.1(inclusive)
cpe:2.3:o:pepperl-fuchs:icrl-m-8rj45\/4sfp-g-din_firmware:*:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>icrl-m-8rj45\/4sfp-g-din>>-
cpe:2.3:h:pepperl-fuchs:icrl-m-8rj45\/4sfp-g-din:-:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>icrl-m-16rj45\/4cp-g-din_firmware>>Versions up to 1.3.1(inclusive)
cpe:2.3:o:pepperl-fuchs:icrl-m-16rj45\/4cp-g-din_firmware:*:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>icrl-m-16rj45\/4cp-g-din>>-
cpe:2.3:h:pepperl-fuchs:icrl-m-16rj45\/4cp-g-din:-:*:*:*:*:*:*:*
korenix
korenix
>>jetnet_5428g-20sfp_firmware>>-
cpe:2.3:o:korenix:jetnet_5428g-20sfp_firmware:-:*:*:*:*:*:*:*
korenix
korenix
>>jetnet_5428g-20sfp>>-
cpe:2.3:h:korenix:jetnet_5428g-20sfp:-:*:*:*:*:*:*:*
korenix
korenix
>>jetnet_5810g_firmware>>-
cpe:2.3:o:korenix:jetnet_5810g_firmware:-:*:*:*:*:*:*:*
korenix
korenix
>>jetnet_5810g>>-
cpe:2.3:h:korenix:jetnet_5810g:-:*:*:*:*:*:*:*
korenix
korenix
>>jetnet_4706f_firmware>>-
cpe:2.3:o:korenix:jetnet_4706f_firmware:-:*:*:*:*:*:*:*
korenix
korenix
>>jetnet_4706f>>-
cpe:2.3:h:korenix:jetnet_4706f:-:*:*:*:*:*:*:*
korenix
korenix
>>jetnet_4706_firmware>>-
cpe:2.3:o:korenix:jetnet_4706_firmware:-:*:*:*:*:*:*:*
korenix
korenix
>>jetnet_4706>>-
cpe:2.3:h:korenix:jetnet_4706:-:*:*:*:*:*:*:*
korenix
korenix
>>jetnet_4510_firmware>>-
cpe:2.3:o:korenix:jetnet_4510_firmware:-:*:*:*:*:*:*:*
korenix
korenix
>>jetnet_4510>>-
cpe:2.3:h:korenix:jetnet_4510:-:*:*:*:*:*:*:*
korenix
korenix
>>jetnet_5010_firmware>>-
cpe:2.3:o:korenix:jetnet_5010_firmware:-:*:*:*:*:*:*:*
korenix
korenix
>>jetnet_5010>>-
cpe:2.3:h:korenix:jetnet_5010:-:*:*:*:*:*:*:*
korenix
korenix
>>jetnet_5310_firmware>>-
cpe:2.3:o:korenix:jetnet_5310_firmware:-:*:*:*:*:*:*:*
korenix
korenix
>>jetnet_5310>>-
cpe:2.3:h:korenix:jetnet_5310:-:*:*:*:*:*:*:*
korenix
korenix
>>jetnet_6095_firmware>>-
cpe:2.3:o:korenix:jetnet_6095_firmware:-:*:*:*:*:*:*:*
korenix
korenix
>>jetnet_6095>>-
cpe:2.3:h:korenix:jetnet_6095:-:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>icrl-m-16rj45\/4cp-g-din_firmware>>-
cpe:2.3:o:pepperl-fuchs:icrl-m-16rj45\/4cp-g-din_firmware:-:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>icrl-m-16rj45\/4cp-g-din>>-
cpe:2.3:h:pepperl-fuchs:icrl-m-16rj45\/4cp-g-din:-:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>icrl-m-8rj45\/4sfp-g-din_firmware>>-
cpe:2.3:o:pepperl-fuchs:icrl-m-8rj45\/4sfp-g-din_firmware:-:*:*:*:*:*:*:*
pepperl-fuchs
pepperl-fuchs
>>icrl-m-8rj45\/4sfp-g-din>>-
cpe:2.3:h:pepperl-fuchs:icrl-m-8rj45\/4sfp-g-din:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-863Primaryinfo@cert.vde.com
CWE-863Secondarynvd@nist.gov
CWE ID: CWE-863
Type: Primary
Source: info@cert.vde.com
CWE ID: CWE-863
Type: Secondary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://packetstormsecurity.com/files/162903/Korenix-CSRF-Backdoor-Accounts-Command-Injection-Missing-Authentication.htmlinfo@cert.vde.com
Exploit
Third Party Advisory
VDB Entry
http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.htmlinfo@cert.vde.com
Exploit
Third Party Advisory
VDB Entry
http://seclists.org/fulldisclosure/2021/Jun/0info@cert.vde.com
Mailing List
Third Party Advisory
https://cert.vde.com/de-de/advisories/vde-2020-040info@cert.vde.com
Third Party Advisory
https://cert.vde.com/en-us/advisories/vde-2020-053info@cert.vde.com
Third Party Advisory
https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-korenix-technology-westermo-pepperl-fuchs/info@cert.vde.com
Third Party Advisory
Hyperlink: http://packetstormsecurity.com/files/162903/Korenix-CSRF-Backdoor-Accounts-Command-Injection-Missing-Authentication.html
Source: info@cert.vde.com
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html
Source: info@cert.vde.com
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: http://seclists.org/fulldisclosure/2021/Jun/0
Source: info@cert.vde.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://cert.vde.com/de-de/advisories/vde-2020-040
Source: info@cert.vde.com
Resource:
Third Party Advisory
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2020-053
Source: info@cert.vde.com
Resource:
Third Party Advisory
Hyperlink: https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-korenix-technology-westermo-pepperl-fuchs/
Source: info@cert.vde.com
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

109Records found

CVE-2017-2305
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-8.8||HIGH
EPSS-0.27% / 50.29%
||
7 Day CHG~0.00%
Published-30 May, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

On Juniper Networks Junos Space versions prior to 16.1R1, due to an insufficient authorization check, readonly users on the Junos Space administrative web interface can create privileged users, allowing privilege escalation.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-junos_spaceJunos Space
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-33335
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.63% / 69.47%
||
7 Day CHG~0.00%
Published-03 Aug, 2021 | 21:03
Updated-13 May, 2025 | 18:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Privilege escalation vulnerability in Liferay Portal 7.0.3 through 7.3.4, and Liferay DXP 7.1 before fix pack 20, and 7.2 before fix pack 9 allows remote authenticated users with permission to update/edit users to take over a company administrator user account by editing the company administrator user.

Action-Not Available
Vendor-n/aLiferay Inc.
Product-liferay_portaldigital_experience_platformn/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-32829
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.6||CRITICAL
EPSS-1.39% / 79.56%
||
7 Day CHG~0.00%
Published-17 Aug, 2021 | 16:00
Updated-03 Aug, 2024 | 23:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Post-authentication Remote Code Execution (RCE) in ZStack REST API

ZStack is open source IaaS(infrastructure as a service) software aiming to automate datacenters, managing resources of compute, storage, and networking all by APIs. Affected versions of ZStack REST API are vulnerable to post-authentication Remote Code Execution (RCE) via bypass of the Groovy shell sandbox. The REST API exposes the GET zstack/v1/batch-queries?script endpoint which is backed up by the BatchQueryAction class. Messages are represented by the APIBatchQueryMsg, dispatched to the QueryFacadeImpl facade and handled by the BatchQuery class. The HTTP request parameter script is mapped to the APIBatchQueryMsg.script property and evaluated as a Groovy script in BatchQuery.query the evaluation of the user-controlled Groovy script is sandboxed by SandboxTransformer which will apply the restrictions defined in the registered (sandbox.register()) GroovyInterceptor. Even though the sandbox heavily restricts the receiver types to a small set of allowed types, the sandbox is non effective at controlling any code placed in Java annotations and therefore vulnerable to meta-programming escapes. This issue leads to post-authenticated remote code execution. For more details see the referenced GHSL-2021-065. This issue is patched in versions 3.8.21, 3.10.8, and 4.1.0.

Action-Not Available
Vendor-zstackzstackio
Product-rest_apizstack
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE ID-CWE-863
Incorrect Authorization
CVE-2017-16773
Matching Score-4
Assigner-Synology Inc.
ShareView Details
Matching Score-4
Assigner-Synology Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.14% / 35.09%
||
7 Day CHG~0.00%
Published-05 Jul, 2018 | 13:00
Updated-17 Sep, 2024 | 00:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authorization vulnerability in Highlight Preview in Synology Universal Search before 1.0.5-0135 allows remote authenticated users to bypass permission checks for directories in POSIX mode.

Action-Not Available
Vendor-Synology, Inc.
Product-universal_searchUniversal Search
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-863
Incorrect Authorization
CVE-2017-15695
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-8.8||HIGH
EPSS-1.60% / 80.93%
||
7 Day CHG~0.00%
Published-13 Jun, 2018 | 17:00
Updated-17 Sep, 2024 | 03:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When an Apache Geode server versions 1.0.0 to 1.4.0 is configured with a security manager, a user with DATA:WRITE privileges is allowed to deploy code by invoking an internal Geode function. This allows remote code execution. Code deployment should be restricted to users with DATA:MANAGE privilege.

Action-Not Available
Vendor-The Apache Software Foundation
Product-geodeApache Geode
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-24282
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-6.3||MEDIUM
EPSS-0.25% / 47.91%
||
7 Day CHG~0.00%
Published-14 May, 2021 | 11:38
Updated-03 Aug, 2024 | 19:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Redirection for Contact Form 7 < 2.3.4 - Unprotected AJAX Actions

In the Redirection for Contact Form 7 WordPress plugin before 2.3.4, any authenticated user, such as a subscriber, could use the various AJAX actions in the plugin to do a variety of things. For example, an attacker could use wpcf7r_reset_settings to reset the plugin’s settings, wpcf7r_add_action to add actions to a form, and more.

Action-Not Available
Vendor-querysolQuery Solutions
Product-redirection_for_contact_form_7Redirection for Contact Form 7
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-24717
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-8.8||HIGH
EPSS-0.24% / 47.23%
||
7 Day CHG~0.00%
Published-01 Nov, 2021 | 08:46
Updated-03 Aug, 2024 | 19:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AutomatorWP < 1.7.6 - Missing Authorization and Privilege Escalation

The AutomatorWP WordPress plugin before 1.7.6 does not perform capability checks which allows users with Subscriber roles to enumerate automations, disclose title of private posts or user emails, call functions, or perform privilege escalation via Ajax actions.

Action-Not Available
Vendor-automatorwpUnknown
Product-automatorwpAutomatorWP
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-1144
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-8.8||HIGH
EPSS-0.46% / 63.34%
||
7 Day CHG~0.00%
Published-13 Jan, 2021 | 21:45
Updated-12 Nov, 2024 | 20:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Connected Mobile Experiences Privilege Escalation Vulnerability

A vulnerability in Cisco Connected Mobile Experiences (CMX) could allow a remote, authenticated attacker without administrative privileges to alter the password of any user on an affected system. The vulnerability is due to incorrect handling of authorization checks for changing a password. An authenticated attacker without administrative privileges could exploit this vulnerability by sending a modified HTTP request to an affected device. A successful exploit could allow the attacker to alter the passwords of any user on the system, including an administrative user, and then impersonate that user.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-connected_mobile_experiencesCisco Connected Mobile Experiences
CWE ID-CWE-863
Incorrect Authorization
CVE-2016-9575
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.27% / 50.30%
||
7 Day CHG~0.00%
Published-13 Mar, 2018 | 13:00
Updated-16 Sep, 2024 | 22:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Ipa versions 4.2.x, 4.3.x before 4.3.3 and 4.4.x before 4.4.3 did not properly check the user's permissions while modifying certificate profiles in IdM's certprofile-mod command. An authenticated, unprivileged attacker could use this flaw to modify profiles to issue certificates with arbitrary naming or key usage information and subsequently use such certificates for other attacks.

Action-Not Available
Vendor-freeipaFreeIPA
Product-freeipaipa
CWE ID-CWE-863
Incorrect Authorization
CWE ID-CWE-285
Improper Authorization
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found