Логотип exploitDog
bind:CVE-2022-35413
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-35413

Количество 2

Количество 2

nvd логотип

CVE-2022-35413

больше 3 лет назад

WAPPLES through 6.0 has a hardcoded systemi account. A threat actor could use this account to access the system configuration and confidential information (such as SSL keys) via an HTTPS request to the /webapi/ URI on port 443 or 5001.

CVSS3: 9.8
EPSS: Высокий
github логотип

GHSA-rwxr-7mfr-m8cg

больше 3 лет назад

WAPPLES through 6.0 has a hardcoded systemi account accessible via db/wp.no1 (as configured in the /opt/penta/wapples/script/wcc_auto_scaling.py file). A threat actor could use this account to access the system configuration and confidential information (such as SSL keys) via an HTTPS request to the /webapi/ URI on port 443 or 5001.

CVSS3: 9.8
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-35413

WAPPLES through 6.0 has a hardcoded systemi account. A threat actor could use this account to access the system configuration and confidential information (such as SSL keys) via an HTTPS request to the /webapi/ URI on port 443 or 5001.

CVSS3: 9.8
86%
Высокий
больше 3 лет назад
github логотип
GHSA-rwxr-7mfr-m8cg

WAPPLES through 6.0 has a hardcoded systemi account accessible via db/wp.no1 (as configured in the /opt/penta/wapples/script/wcc_auto_scaling.py file). A threat actor could use this account to access the system configuration and confidential information (such as SSL keys) via an HTTPS request to the /webapi/ URI on port 443 or 5001.

CVSS3: 9.8
86%
Высокий
больше 3 лет назад

Уязвимостей на страницу