Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-1000875

Опубликовано: 20 дек. 2018
Источник: ubuntu
Приоритет: medium
CVSS2: 7.5
CVSS3: 9.8

Описание

Berkeley Open Infrastructure for Network Computing BOINC Server and Website Code version 0.9-1.0.2 contains a CWE-302: Authentication Bypass by Assumed-Immutable Data vulnerability in Website Terms of Service Acceptance Page that can result in Access to any user account. This attack appear to be exploitable via Specially crafted URL. This vulnerability appears to have been fixed in 1.0.3.

РелизСтатусПримечание
bionic

ignored

end of standard support
cosmic

ignored

end of life
devel

not-affected

src:boinc only covers the client
disco

ignored

end of life
eoan

ignored

end of life
esm-apps/bionic

not-affected

src:boinc only covers the client
esm-apps/focal

not-affected

src:boinc only covers the client
esm-apps/xenial

not-affected

src:boinc only covers the client
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needs-triage]
focal

ignored

end of standard support, was not-affected [src:boinc only covers the client]

Показывать по

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
около 7 лет назад

Berkeley Open Infrastructure for Network Computing BOINC Server and Website Code version 0.9-1.0.2 contains a CWE-302: Authentication Bypass by Assumed-Immutable Data vulnerability in Website Terms of Service Acceptance Page that can result in Access to any user account. This attack appear to be exploitable via Specially crafted URL. This vulnerability appears to have been fixed in 1.0.3.

CVSS3: 9.8
github
больше 3 лет назад

Berkeley Open Infrastructure for Network Computing BOINC Server and Website Code version 0.9-1.0.2 contains a CWE-302: Authentication Bypass by Assumed-Immutable Data vulnerability in Website Terms of Service Acceptance Page that can result in Access to any user account. This attack appear to be exploitable via Specially crafted URL. This vulnerability appears to have been fixed in 1.0.3.

7.5 High

CVSS2

9.8 Critical

CVSS3