Vulnerability Name: | CVE-2015-6816 (CCN-106242) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2015-09-04 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2015-09-04 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2017-08-20 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | ganglia-web before 3.7.1 allows remote attackers to bypass authentication. | ||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.6 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:U/RC:R)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-287 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2015-6816 Source: FEDORA Type: Third Party Advisory FEDORA-2015-de8ba28354 Source: FEDORA Type: Third Party Advisory FEDORA-2015-accdc7ebfc Source: FEDORA Type: Third Party Advisory FEDORA-2015-ee7a2b5844 Source: CCN Type: oss-sec Mailing List, Fri, 04 Sep 2015 20:34:39 +0300 CVE request: Ganglia-web auth bypass Source: CCN Type: oss-sec Mailing List, Sat, 5 Sep 2015 12:36:37 -0400 (EDT) Re: CVE request: Ganglia-web auth bypass Source: CCN Type: IBM Security Bulletin T1024262 (PowerKVM) A vulnerability in ganglia affects PowerKVM (CVE-2015-6816) Source: MLIST Type: Exploit, Mailing List, VDB Entry [oss-security] 20150905 Re: CVE request: Ganglia-web auth bypass Source: BID Type: Third Party Advisory, VDB Entry 92146 Source: CONFIRM Type: Exploit, Issue Tracking, Third Party Advisory, VDB Entry https://bugzilla.redhat.com/show_bug.cgi?id=1260562 Source: XF Type: UNKNOWN ganglia-cve20156816-sec-bypass(106242) Source: CCN Type: ganglia-web GIT Repository [Security] auth bypass #267 Source: CONFIRM Type: Third Party Advisory https://github.com/ganglia/ganglia-web/issues/267 Source: MISC Type: Patch, Third Party Advisory https://www.freshports.org/sysutils/ganglia-webfrontend/ | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: ![]() | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |