Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-10865

Опубликовано: 21 июн. 2018
Источник: redhat
CVSS3: 5.8
EPSS Низкий

Описание

It was discovered that the /configuration view of redhat-certification 7 does not perform an authorization check and it allows an unauthenticated user to call a "restart" RPC method on any host accessible by the system, even if not belonging to him.

It has been discovered that redhat-certification does not perform an authorization check and allows an unauthenticated user to call a "restart" RPC method on any host accessible by the system. An attacker could use this flaw to send requests to port 8009 of any host or to keep restarting the RHCertD daemon on a host of another customer.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Certification for Red Hat Enterprise Linux 6redhat-certificationNot affected
Red Hat Certification for Red Hat Enterprise Linux 7redhat-certificationAffected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-862
https://bugzilla.redhat.com/show_bug.cgi?id=1593631redhat-certification: "restart" a node without authorization

EPSS

Процентиль: 76%
0.00977
Низкий

5.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
больше 4 лет назад

It was discovered that the /configuration view of redhat-certification 7 does not perform an authorization check and it allows an unauthenticated user to call a "restart" RPC method on any host accessible by the system, even if not belonging to him.

CVSS3: 7.5
github
больше 3 лет назад

It has been discovered that redhat-certification does not perform an authorization check and allows an unauthenticated user to call a "restart" RPC method on any host accessible by the system. An attacker could use this flaw to send requests to port 8009 of any host or to keep restarting the RHCertD daemon on a host of another customer. This flaw affects redhat-certification version 7.

EPSS

Процентиль: 76%
0.00977
Низкий

5.8 Medium

CVSS3