Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2018-1000133
Analyzed
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-16 Mar, 2018 | 14:29
Updated At-03 Oct, 2019 | 00:03

Pitchfork version 1.4.6 RC1 contains an Improper Privilege Management vulnerability in Trident Pitchfork components that can result in A standard unprivileged user could gain system administrator permissions within the web portal.. This attack appear to be exploitable via The user must be able to login, and could edit their profile and set the "System Administrator" permission to "yes" on themselves.. This vulnerability appears to have been fixed in 1.4.6 RC2.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.07.5HIGH
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Primary2.06.0MEDIUM
AV:N/AC:M/Au:S/C:P/I:P/A:P
Type: Primary
Version: 3.0
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 6.0
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:S/C:P/I:P/A:P
CPE Matches

secluded
secluded
>>trident>>1.4.6
cpe:2.3:a:secluded:trident:1.4.6:rc1:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-269Primarynvd@nist.gov
CWE ID: CWE-269
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/tridentli/pitchfork/commit/33549f15707801099e1253dd5e79369bd48eb59bcve@mitre.org
Patch
Third Party Advisory
https://github.com/tridentli/pitchfork/commit/9fd07cbe4f93e1367e142016e9a205366680dd54cve@mitre.org
Patch
Third Party Advisory
https://github.com/tridentli/pitchfork/issues/168cve@mitre.org
Issue Tracking
Third Party Advisory
https://github.com/tridentli/trident/releases/tag/DEV_1.4.6-RC2cve@mitre.org
Third Party Advisory
https://thomas-ward.net/security-advisories/trident-trusted-communications-platform-privilege-escalation-issue-advisory/cve@mitre.org
Third Party Advisory
Hyperlink: https://github.com/tridentli/pitchfork/commit/33549f15707801099e1253dd5e79369bd48eb59b
Source: cve@mitre.org
Resource:
Patch
Third Party Advisory
Hyperlink: https://github.com/tridentli/pitchfork/commit/9fd07cbe4f93e1367e142016e9a205366680dd54
Source: cve@mitre.org
Resource:
Patch
Third Party Advisory
Hyperlink: https://github.com/tridentli/pitchfork/issues/168
Source: cve@mitre.org
Resource:
Issue Tracking
Third Party Advisory
Hyperlink: https://github.com/tridentli/trident/releases/tag/DEV_1.4.6-RC2
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://thomas-ward.net/security-advisories/trident-trusted-communications-platform-privilege-escalation-issue-advisory/
Source: cve@mitre.org
Resource:
Third Party Advisory
Change History
0Changes found

Details not found