Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-11787

Опубликовано: 18 сент. 2018
Источник: redhat
CVSS3: 9.4
EPSS Низкий

Описание

In Apache Karaf version prior to 3.0.9, 4.0.9, 4.1.1, when the webconsole feature is installed in Karaf, it is available at .../system/console and requires authentication to access it. One part of the console is a Gogo shell/console that gives access to the command line console of Karaf via a Web browser, and when navigated to it is available at .../system/console/gogo. Trying to go directly to that URL does require authentication. And optional bundle that some applications use is the Pax Web Extender Whiteboard, it is part of the pax-war feature and perhaps others. When it is installed, the Gogo console becomes available at another URL .../gogo/, and that URL is not secured giving access to the Karaf console to unauthenticated users. A mitigation for the issue is to manually stop/uninstall Gogo plugin bundle that is installed with the webconsole feature, although of course this removes the console from the .../system/console application, not only from the unauthenticated endpoint. One could also stop/uninstall the Pax Web Extender Whiteboard, but other components/applications may require it and so their functionality would be reduced/compromised.

Prior to Karaf 3.0.9, Karaf 4.0.9, and Karaf 4.1.1, HTTP endpoints published by Karaf features may also be published under the HTTP web root, in addition to the paths specifically configured by the installed feature. Authentication and access control rules may not cover this additional path, potentially leading to authentication bypass on published features. The Gogo shell provided by the webconsole feature is potentially accessible without authentication as a result.

Отчет

Open Daylight: The webconsole feature is not installed by default. In RHOSP12 and earlier, when the webconsole feature is installed, the gogo webshell potentially provides access to the Karaf console without authentication.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Fuse 7karafNot affected
Red Hat JBoss A-MQ 6karafOut of support scope
Red Hat JBoss Fuse 6karafOut of support scope
Red Hat JBoss Fuse Service Works 6karafWill not fix
Red Hat OpenStack Platform 10 (Newton)opendaylightWill not fix
Red Hat OpenStack Platform 12 (Pike)opendaylightWill not fix
Red Hat OpenStack Platform 13 (Queens)opendaylightNot affected
Red Hat OpenStack Platform 8 (Liberty)opendaylightWill not fix
Red Hat OpenStack Platform 9 (Mitaka)opendaylightWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-287
https://bugzilla.redhat.com/show_bug.cgi?id=1631100karaf: Authentication bypass access to Gogo shell in the webconsole

EPSS

Процентиль: 71%
0.00697
Низкий

9.4 Critical

CVSS3

Связанные уязвимости

CVSS3: 8.1
nvd
больше 7 лет назад

In Apache Karaf version prior to 3.0.9, 4.0.9, 4.1.1, when the webconsole feature is installed in Karaf, it is available at .../system/console and requires authentication to access it. One part of the console is a Gogo shell/console that gives access to the command line console of Karaf via a Web browser, and when navigated to it is available at .../system/console/gogo. Trying to go directly to that URL does require authentication. And optional bundle that some applications use is the Pax Web Extender Whiteboard, it is part of the pax-war feature and perhaps others. When it is installed, the Gogo console becomes available at another URL .../gogo/, and that URL is not secured giving access to the Karaf console to unauthenticated users. A mitigation for the issue is to manually stop/uninstall Gogo plugin bundle that is installed with the webconsole feature, although of course this removes the console from the .../system/console application, not only from the unauthenticated endpoint. One

CVSS3: 8.1
debian
больше 7 лет назад

In Apache Karaf version prior to 3.0.9, 4.0.9, 4.1.1, when the webcons ...

CVSS3: 8.1
github
около 7 лет назад

Improper Authentication in Apache Karaf

EPSS

Процентиль: 71%
0.00697
Низкий

9.4 Critical

CVSS3