ID |
CVE-2018-11798
|
Summary |
The Apache Thrift Node.js static web server in versions 0.9.2 through 0.11.0 have been determined to contain a security vulnerability in which a remote user has the ability to access files outside the set webservers docroot path. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:apache:thrift:0.9.2:*:*:*:*:node.js:*:*
cpe:2.3:a:apache:thrift:0.9.2:*:*:*:*:node.js:*:*
-
cpe:2.3:a:apache:thrift:0.9.3:*:*:*:*:node.js:*:*
cpe:2.3:a:apache:thrift:0.9.3:*:*:*:*:node.js:*:*
-
cpe:2.3:a:apache:thrift:0.10.0:*:*:*:*:node.js:*:*
cpe:2.3:a:apache:thrift:0.10.0:*:*:*:*:node.js:*:*
-
cpe:2.3:a:apache:thrift:0.11.0:*:*:*:*:node.js:*:*
cpe:2.3:a:apache:thrift:0.11.0:*:*:*:*:node.js:*:*
|
CVSS |
Base: | 4.0 (as of 19-06-2019 - 00:15) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-538 |
CAPEC |
-
WSDL Scanning
This attack targets the WSDL interface made available by a web service. The attacker may scan the WSDL interface to reveal sensitive information about invocation patterns, underlying technology implementations and associated vulnerabilities. This type of probing is carried out to perform more serious attacks (e.g. parameter tampering, malicious content injection, command injection, etc.). WSDL files provide detailed information about the services ports and bindings available to consumers. For instance, the attacker can submit special characters or malicious content to the Web service and can cause a denial of service condition or illegal access to database records. In addition, the attacker may try to guess other private methods by using the information provided in the WSDL files.
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
SINGLE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
NONE |
NONE |
|
cvss-vector
via4
|
AV:N/AC:L/Au:S/C:P/I:N/A:N
|
redhat
via4
|
|
refmap
via4
|
|
Last major update |
19-06-2019 - 00:15 |
Published |
07-01-2019 - 17:29 |
Last modified |
19-06-2019 - 00:15 |