Vulnerability Name:
CVE-2016-3163 (CCN-111045)
Assigned:
2016-02-24
Published:
2016-02-24
Updated:
2016-04-19
Summary:
The XML-RPC system in Drupal 6.x before 6.38 and 7.x before 7.43 might make it easier for remote attackers to conduct brute-force attacks via a large number of calls made at once to the same method.
CVSS v3 Severity:
7.5 High
(CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
)
6.5 Medium
(Temporal CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
High
Availibility (A):
None
5.3 Medium
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
)
4.6 Medium
(CCN Temporal CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
Low
Integrity (I):
None
Availibility (A):
None
CVSS v2 Severity:
5.0 Medium
(CVSS v2 Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Partial
Availibility (A):
None
5.0 Medium
(CCN CVSS v2 Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
None
Availibility (A):
None
Vulnerability Type:
CWE-254
Vulnerability Consequences:
Gain Access
References:
Source: MITRE
Type: CNA
CVE-2016-3163
Source: DEBIAN
Type: UNKNOWN
DSA-3498
Source: MLIST
Type: UNKNOWN
[oss-security] 20160224 CVE requests for Drupal core (SA-CORE-2016-001)
Source: MLIST
Type: UNKNOWN
[oss-security] 20160315 Re: CVE requests for Drupal core (SA-CORE-2016-001)
Source: XF
Type: UNKNOWN
drupal-xmlrpc-weak-security(111045)
Source: CCN
Type: SA-CORE-2016-001
Critical - Multiple Vulnerabilities
Source: CONFIRM
Type: Patch, Vendor Advisory
https://www.drupal.org/SA-CORE-2016-001
Vulnerable Configuration:
Configuration 1
:
cpe:/o:debian:debian_linux:7.0:*:*:*:*:*:*:*
OR
cpe:/o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Configuration 2
:
cpe:/a:drupal:drupal:6.0:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:beta1:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:beta2:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:beta3:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:beta4:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:dev:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:rc1:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:rc2:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:rc3:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:rc4:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.1:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.2:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.3:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.4:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.5:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.6:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.7:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.8:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.10:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.11:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.12:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.13:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.14:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.15:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.16:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.17:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.18:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.19:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.20:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.21:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.22:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.23:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.24:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.25:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.26:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.27:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.28:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.29:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.30:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.31:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.32:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.33:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.34:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.35:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.36:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.37:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:alpha1:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:alpha2:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:alpha3:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:alpha4:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:alpha5:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:alpha6:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:alpha7:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:beta1:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:beta2:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:beta3:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:dev:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:rc1:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:rc2:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:rc3:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:rc4:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.1:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.2:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.3:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.4:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.5:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.6:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.7:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.8:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.9:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.10:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.11:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.12:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.13:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.14:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.15:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.16:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.17:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.18:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.19:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.20:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.21:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.22:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.23:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.24:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.25:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.26:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.27:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.28:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.29:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.30:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.31:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.32:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.33:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.34:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.35:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.36:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.37:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.38:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.40:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.41:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.42:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.x-dev:*:*:*:*:*:*:*
Configuration CCN 1
:
cpe:/a:drupal:drupal:6.37:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.42:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:8.0.3:*:*:*:*:*:*:*
Denotes that component is vulnerable
Oval Definitions
Definition ID
Class
Title
Last Modified
oval:com.ubuntu.artful:def:20163163000
V
CVE-2016-3163 on Ubuntu 17.10 (artful) - untriaged.
2016-04-12
oval:com.ubuntu.xenial:def:201631630000000
V
CVE-2016-3163 on Ubuntu 16.04 LTS (xenial) - medium.
2016-04-12
oval:com.ubuntu.precise:def:20163163000
V
CVE-2016-3163 on Ubuntu 12.04 LTS (precise) - untriaged.
2016-04-12
oval:com.ubuntu.trusty:def:20163163000
V
CVE-2016-3163 on Ubuntu 14.04 LTS (trusty) - medium.
2016-04-12
oval:com.ubuntu.xenial:def:20163163000
V
CVE-2016-3163 on Ubuntu 16.04 LTS (xenial) - medium.
2016-04-12
BACK
debian
debian linux 7.0
debian
debian linux 8.0
drupal
drupal 6.0
drupal
drupal 6.0 beta1
drupal
drupal 6.0 beta2
drupal
drupal 6.0 beta3
drupal
drupal 6.0 beta4
drupal
drupal 6.0 dev
drupal
drupal 6.0 rc1
drupal
drupal 6.0 rc2
drupal
drupal 6.0 rc3
drupal
drupal 6.0 rc4
drupal
drupal 6.1
drupal
drupal 6.2
drupal
drupal 6.3
drupal
drupal 6.4
drupal
drupal 6.5
drupal
drupal 6.6
drupal
drupal 6.7
drupal
drupal 6.8
drupal
drupal 6.10
drupal
drupal 6.11
drupal
drupal 6.12
drupal
drupal 6.13
drupal
drupal 6.14
drupal
drupal 6.15
drupal
drupal 6.16
drupal
drupal 6.17
drupal
drupal 6.18
drupal
drupal 6.19
drupal
drupal 6.20
drupal
drupal 6.21
drupal
drupal 6.22
drupal
drupal 6.23
drupal
drupal 6.24
drupal
drupal 6.25
drupal
drupal 6.26
drupal
drupal 6.27
drupal
drupal 6.28
drupal
drupal 6.29
drupal
drupal 6.30
drupal
drupal 6.31
drupal
drupal 6.32
drupal
drupal 6.33
drupal
drupal 6.34
drupal
drupal 6.35
drupal
drupal 6.36
drupal
drupal 6.37
drupal
drupal 7.0
drupal
drupal 7.0 alpha1
drupal
drupal 7.0 alpha2
drupal
drupal 7.0 alpha3
drupal
drupal 7.0 alpha4
drupal
drupal 7.0 alpha5
drupal
drupal 7.0 alpha6
drupal
drupal 7.0 alpha7
drupal
drupal 7.0 beta1
drupal
drupal 7.0 beta2
drupal
drupal 7.0 beta3
drupal
drupal 7.0 dev
drupal
drupal 7.0 rc1
drupal
drupal 7.0 rc2
drupal
drupal 7.0 rc3
drupal
drupal 7.0 rc4
drupal
drupal 7.1
drupal
drupal 7.2
drupal
drupal 7.3
drupal
drupal 7.4
drupal
drupal 7.5
drupal
drupal 7.6
drupal
drupal 7.7
drupal
drupal 7.8
drupal
drupal 7.9
drupal
drupal 7.10
drupal
drupal 7.11
drupal
drupal 7.12
drupal
drupal 7.13
drupal
drupal 7.14
drupal
drupal 7.15
drupal
drupal 7.16
drupal
drupal 7.17
drupal
drupal 7.18
drupal
drupal 7.19
drupal
drupal 7.20
drupal
drupal 7.21
drupal
drupal 7.22
drupal
drupal 7.23
drupal
drupal 7.24
drupal
drupal 7.25
drupal
drupal 7.26
drupal
drupal 7.27
drupal
drupal 7.28
drupal
drupal 7.29
drupal
drupal 7.30
drupal
drupal 7.31
drupal
drupal 7.32
drupal
drupal 7.33
drupal
drupal 7.34
drupal
drupal 7.35
drupal
drupal 7.36
drupal
drupal 7.37
drupal
drupal 7.38
drupal
drupal 7.40
drupal
drupal 7.41
drupal
drupal 7.42
drupal
drupal 7.x-dev
drupal
drupal 6.37
drupal
drupal 7.42
drupal
drupal 8.0.3