ID CVE-2017-14460
Summary An exploitable overly permissive cross-domain (CORS) whitelist vulnerability exists in JSON-RPC of Parity Ethereum client version 1.7.8. An automatically sent JSON object to JSON-RPC endpoint can trigger this vulnerability. A victim needs to visit a malicious website to trigger this vulnerability.
References
Vulnerable Configurations
  • cpe:2.3:a:parity:ethereum_client:1.7.8:*:*:*:*:*:*:*
    cpe:2.3:a:parity:ethereum_client:1.7.8:*:*:*:*:*:*:*
CVSS
Base: 5.1 (as of 19-04-2022 - 19:15)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:H/Au:N/C:P/I:P/A:P
refmap via4
misc https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0508
Last major update 19-04-2022 - 19:15
Published 19-01-2018 - 23:29
Last modified 19-04-2022 - 19:15
Back to Top