ID CVE-2015-8400
Summary The HTTPS fallback implementation in Shell In A Box (aka shellinabox) before 2.19 makes it easier for remote attackers to conduct DNS rebinding attacks via the "/plain" URL.
References
Vulnerable Configurations
  • cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.0-1:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.0-1:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.1:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.1-1:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.1-1:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.2:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.2-1:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.2-1:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.3:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.3-1:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.3-1:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.4-1:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.4-1:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.5:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.5-1:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.5-1:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.6:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.6-1:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.6-1:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.7:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.7-1:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.7-1:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.8:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.8-1:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.8-1:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.9:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.9-1:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.9-1:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.10:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.10-1:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.10-1:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.11:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.12:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.13:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.13:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.14:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.14:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.15:-:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.15:-:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.15:rc2:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.15:rc2:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.16:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.16:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.17:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.17:*:*:*:*:*:*:*
  • cpe:2.3:a:shellinabox_project:shellinabox:2.18:*:*:*:*:*:*:*
    cpe:2.3:a:shellinabox_project:shellinabox:2.18:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 20-01-2016 - 14:15)
Impact:
Exploitability:
CWE CWE-254
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:P/A:N
refmap via4
confirm
fedora
  • FEDORA-2015-1c773e8702
  • FEDORA-2015-463143720f
mlist
  • [oss-security] 20151202 Re: shellinabox - DNS rebinding attack due to HTTP fallback
  • [oss-security] 20151202 shellinabox - DNS rebinding attack due to HTTP fallback
Last major update 20-01-2016 - 14:15
Published 12-01-2016 - 19:59
Last modified 20-01-2016 - 14:15
Back to Top