Vulnerability Name: | CVE-2017-11610 (CCN-130895) | ||||||||||||||||||||||||||||
Assigned: | 2017-07-19 | ||||||||||||||||||||||||||||
Published: | 2017-07-19 | ||||||||||||||||||||||||||||
Updated: | 2019-10-03 | ||||||||||||||||||||||||||||
Summary: | The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 8.2 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
8.2 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 9.0 High (CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-276 | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-11610 Source: DEBIAN Type: Third Party Advisory DSA-3942 Source: REDHAT Type: Third Party Advisory RHSA-2017:3005 Source: XF Type: UNKNOWN supervisor-cve201711610-cmd-exec(130895) Source: CONFIRM Type: Release Notes, Vendor Advisory https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt Source: CONFIRM Type: Release Notes, Vendor Advisory https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt Source: CONFIRM Type: Release Notes, Vendor Advisory https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt Source: CONFIRM Type: Release Notes, Vendor Advisory https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt Source: CCN Type: supervisor GIT Repository [CVE-2017-11610] RCE vulnerability report #964 Source: CONFIRM Type: Issue Tracking, Vendor Advisory https://github.com/Supervisor/supervisor/issues/964 Source: FEDORA Type: Third Party Advisory FEDORA-2017-307eab89e1 Source: FEDORA Type: Third Party Advisory FEDORA-2017-85eb9f7a36 Source: FEDORA Type: Third Party Advisory FEDORA-2017-713430fb15 Source: CCN Type: Packet Storm Security [09-25-2017] Supervisor XML-RPC Authenticated Remote Code Execution Source: GENTOO Type: Third Party Advisory GLSA-201709-06 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [09-25-2017] Source: EXPLOIT-DB Type: Exploit, Third Party Advisory, VDB Entry 42779 Source: CCN Type: WhiteSource Vulnerability Database CVE-2017-11610 | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Denotes that component is vulnerable | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |