Vulnerabilites related to xorux - lpar2rrd
Vulnerability from fkie_nvd
Published
2021-11-08 05:15
Modified
2024-11-21 06:27
Severity ?
Summary
lpar2rrd is a hardcoded system account in XoruX LPAR2RRD and STOR2RRD before 7.30.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/orangecertcc/security-research/security/advisories/GHSA-p2fq-9h5j-x6w5 | Third Party Advisory | |
cve@mitre.org | https://lpar2rrd.com/note730.php | Release Notes, Vendor Advisory | |
cve@mitre.org | https://stor2rrd.com/note730.php | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/orangecertcc/security-research/security/advisories/GHSA-p2fq-9h5j-x6w5 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lpar2rrd.com/note730.php | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://stor2rrd.com/note730.php | Release Notes, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xorux:lpar2rrd:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE900D73-0FCC-4EC3-96C8-B8EF6E7E080C", "versionEndExcluding": "7.30", "vulnerable": true }, { "criteria": "cpe:2.3:a:xorux:stor2rrd:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A2AFD8C-75D4-417D-ABE5-E8383D316645", "versionEndExcluding": "7.30", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "lpar2rrd is a hardcoded system account in XoruX LPAR2RRD and STOR2RRD before 7.30." }, { "lang": "es", "value": "lpar2rrd es una cuenta de sistema codificada en XoruX LPAR2RRD y STOR2RRD versiones anteriores a 7.30" } ], "id": "CVE-2021-42371", "lastModified": "2024-11-21T06:27:40.820", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-08T05:15:07.770", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-p2fq-9h5j-x6w5" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://lpar2rrd.com/note730.php" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://stor2rrd.com/note730.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-p2fq-9h5j-x6w5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://lpar2rrd.com/note730.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://stor2rrd.com/note730.php" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-922" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-08 05:15
Modified
2024-11-21 06:27
Severity ?
Summary
A password mismanagement situation exists in XoruX LPAR2RRD and STOR2RRD before 7.30 because cleartext information is present in HTML password input fields in the device properties. (Viewing the passwords requires configuring a web browser to display HTML password input fields.)
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/orangecertcc/security-research/security/advisories/GHSA-f3qp-4xqq-2wjx | Third Party Advisory | |
cve@mitre.org | https://lpar2rrd.com/note730.php | Release Notes, Vendor Advisory | |
cve@mitre.org | https://stor2rrd.com/note730.php | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/orangecertcc/security-research/security/advisories/GHSA-f3qp-4xqq-2wjx | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lpar2rrd.com/note730.php | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://stor2rrd.com/note730.php | Release Notes, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xorux:lpar2rrd:*:*:*:*:*:*:*:*", "matchCriteriaId": "18C13897-3921-46AC-BB02-4D5CEB3FF48A", "versionEndExcluding": "7.30", "versionStartIncluding": "7.21", "vulnerable": true }, { "criteria": "cpe:2.3:a:xorux:stor2rrd:*:*:*:*:*:*:*:*", "matchCriteriaId": "F02B19C0-7243-4034-A064-2BAA032B30EA", "versionEndExcluding": "7.30", "versionStartIncluding": "7.21", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A password mismanagement situation exists in XoruX LPAR2RRD and STOR2RRD before 7.30 because cleartext information is present in HTML password input fields in the device properties. (Viewing the passwords requires configuring a web browser to display HTML password input fields.)" }, { "lang": "es", "value": "Se presenta una situaci\u00f3n de manejo inapropiado de contrase\u00f1as en XoruX LPAR2RRD y STOR2RRD versiones anteriores a 7.30, porque la informaci\u00f3n en texto sin cifrar est\u00e1 presente en los campos de entrada de contrase\u00f1as HTML en las propiedades del dispositivo. (Una visualizaci\u00f3n de las contrase\u00f1as requiere la configuraci\u00f3n de un navegador web para mostrar los campos de entrada de contrase\u00f1as HTML)" } ], "id": "CVE-2021-42370", "lastModified": "2024-11-21T06:27:40.653", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-08T05:15:07.713", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-f3qp-4xqq-2wjx" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://lpar2rrd.com/note730.php" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://stor2rrd.com/note730.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-f3qp-4xqq-2wjx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://lpar2rrd.com/note730.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://stor2rrd.com/note730.php" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-312" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-08 05:15
Modified
2024-11-21 06:27
Severity ?
Summary
A shell command injection in the HW Events SNMP community in XoruX LPAR2RRD and STOR2RRD before 7.30 allows authenticated remote attackers to execute arbitrary shell commands as the user running the service.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/orangecertcc/security-research/security/advisories/GHSA-xfw3-pgp3-5j2p | Exploit, Third Party Advisory | |
cve@mitre.org | https://lpar2rrd.com/note730.php | Release Notes, Vendor Advisory | |
cve@mitre.org | https://stor2rrd.com/note730.php | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/orangecertcc/security-research/security/advisories/GHSA-xfw3-pgp3-5j2p | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lpar2rrd.com/note730.php | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://stor2rrd.com/note730.php | Release Notes, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xorux:lpar2rrd:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE900D73-0FCC-4EC3-96C8-B8EF6E7E080C", "versionEndExcluding": "7.30", "vulnerable": true }, { "criteria": "cpe:2.3:a:xorux:stor2rrd:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A2AFD8C-75D4-417D-ABE5-E8383D316645", "versionEndExcluding": "7.30", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A shell command injection in the HW Events SNMP community in XoruX LPAR2RRD and STOR2RRD before 7.30 allows authenticated remote attackers to execute arbitrary shell commands as the user running the service." }, { "lang": "es", "value": "Una inyecci\u00f3n de comandos de shell en la comunidad HW Events SNMP en XoruX LPAR2RRD y STOR2RRD versiones anteriores a 7.30 permite a atacantes remotos autenticados ejecutar comandos de shell arbitrarios como el usuario que ejecuta el servicio" } ], "id": "CVE-2021-42372", "lastModified": "2024-11-21T06:27:40.980", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-08T05:15:07.827", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-xfw3-pgp3-5j2p" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://lpar2rrd.com/note730.php" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://stor2rrd.com/note730.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-xfw3-pgp3-5j2p" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://lpar2rrd.com/note730.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://stor2rrd.com/note730.php" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-02-17 22:15
Modified
2024-11-21 02:11
Severity ?
Summary
LPAR2RRD in 3.5 and earlier allows remote attackers to execute arbitrary commands due to insufficient input sanitization of the web GUI parameters.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xorux:lpar2rrd:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9EC3D0F-295C-47D0-86F9-9A0B8812BDA8", "versionEndIncluding": "3.50", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "LPAR2RRD in 3.5 and earlier allows remote attackers to execute arbitrary commands due to insufficient input sanitization of the web GUI parameters." }, { "lang": "es", "value": "LPAR2RRD en versiones 3.5 y anteriores, permite a atacantes remotos ejecutar comandos arbitrarios debido a el saneamiento de entrada insuficiente de los par\u00e1metros de la GUI web." } ], "id": "CVE-2014-4981", "lastModified": "2024-11-21T02:11:13.087", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-02-17T22:15:11.407", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://ocert.org/advisories/ocert-2014-005.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/127593/LPAR2RRD-3.5-4.53-Command-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.lpar2rrd.com/note453-01.htm" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2014/07/23/6" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/68844" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94784" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://ocert.org/advisories/ocert-2014-005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/127593/LPAR2RRD-3.5-4.53-Command-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.lpar2rrd.com/note453-01.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2014/07/23/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/68844" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94784" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-08-18 21:15
Modified
2024-11-21 05:14
Severity ?
Summary
tz.pl on XoruX LPAR2RRD and STOR2RRD 2.70 virtual appliances allows cmd=set&tz=OS command injection via shell metacharacters in a timezone.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://pastebin.com/G8981Fj8 | Third Party Advisory | |
cve@mitre.org | https://pastebin.com/dHhawgx8 | Broken Link | |
cve@mitre.org | https://www.stor2rrd.com/download.php | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://pastebin.com/G8981Fj8 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://pastebin.com/dHhawgx8 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.stor2rrd.com/download.php | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xorux:lpar2rrd:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "37A7E247-0712-4686-8D65-C237F6989AC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:xorux:stor2rrd:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "186C73C9-50B8-4A18-8A46-5FD92B34005C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "tz.pl on XoruX LPAR2RRD and STOR2RRD 2.70 virtual appliances allows cmd=set\u0026tz=OS command injection via shell metacharacters in a timezone." }, { "lang": "es", "value": "El archivo tz.pl en los dispositivos virtuales XoruX LPAR2RRD y STOR2RRD versi\u00f3n 2.70, permite una inyecci\u00f3n de comandos cmd=set\u0026amp;tz=OS por medio de metacaracteres de shell en una zona horaria." } ], "id": "CVE-2020-24032", "lastModified": "2024-11-21T05:14:20.447", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-08-18T21:15:12.300", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://pastebin.com/G8981Fj8" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://pastebin.com/dHhawgx8" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.stor2rrd.com/download.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://pastebin.com/G8981Fj8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://pastebin.com/dHhawgx8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.stor2rrd.com/download.php" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-07-29 00:15
Modified
2025-10-09 17:43
Severity ?
Summary
An authenticated, read-only user can kill any processes running on the Xormon Original virtual appliance as the lpar2rrd user.
References
▼ | URL | Tags | |
---|---|---|---|
bbf0bd87-ece2-41be-b873-96928ee8fab9 | https://korelogic.com/Resources/Advisories/KL-001-2025-014.txt | Exploit, Third Party Advisory | |
bbf0bd87-ece2-41be-b873-96928ee8fab9 | https://lpar2rrd.com/note800.php | Release Notes |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xorux:lpar2rrd:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B49D9F5-0510-4191-B286-427ECC02C837", "versionEndIncluding": "8.04", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An authenticated, read-only user can kill any processes running on the Xormon Original virtual appliance as the lpar2rrd user." }, { "lang": "es", "value": "Un usuario autenticado de solo lectura puede matar cualquier proceso que se ejecute en el dispositivo virtual Xormon Original como usuario lpar2rrd." } ], "id": "CVE-2025-54767", "lastModified": "2025-10-09T17:43:28.467", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-07-29T00:15:24.220", "references": [ { "source": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://korelogic.com/Resources/Advisories/KL-001-2025-014.txt" }, { "source": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "tags": [ "Release Notes" ], "url": "https://lpar2rrd.com/note800.php" } ], "sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-648" } ], "source": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2025-07-29 00:15
Modified
2025-10-09 17:43
Severity ?
Summary
An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker.
References
▼ | URL | Tags | |
---|---|---|---|
bbf0bd87-ece2-41be-b873-96928ee8fab9 | https://korelogic.com/Resources/Advisories/KL-001-2025-016.txt | Exploit, Third Party Advisory | |
bbf0bd87-ece2-41be-b873-96928ee8fab9 | https://lpar2rrd.com/note800.php | Release Notes |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xorux:lpar2rrd:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B49D9F5-0510-4191-B286-427ECC02C837", "versionEndIncluding": "8.04", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker." }, { "lang": "es", "value": "Un usuario autenticado de solo lectura puede cargar un archivo y realizar un directory traversal para colocarlo en la ubicaci\u00f3n que elija. Esto puede usarse para sobrescribir m\u00f3dulos PERL existentes en la aplicaci\u00f3n y lograr la ejecuci\u00f3n remota de c\u00f3digo (RCE) por parte de un atacante." } ], "id": "CVE-2025-54769", "lastModified": "2025-10-09T17:43:42.650", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-07-29T00:15:24.473", "references": [ { "source": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://korelogic.com/Resources/Advisories/KL-001-2025-016.txt" }, { "source": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "tags": [ "Release Notes" ], "url": "https://lpar2rrd.com/note800.php" } ], "sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-24" }, { "lang": "en", "value": "CWE-434" }, { "lang": "en", "value": "CWE-648" } ], "source": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2025-07-29 00:15
Modified
2025-10-09 17:43
Severity ?
Summary
An API endpoint that should be limited to web application administrators is hidden from, but accessible by, lower-level read only web application users. The endpoint can be used to download logs from the appliance configuration, exposing sensitive information.
References
▼ | URL | Tags | |
---|---|---|---|
bbf0bd87-ece2-41be-b873-96928ee8fab9 | https://korelogic.com/Resources/Advisories/KL-001-2025-015.txt | Exploit, Third Party Advisory | |
bbf0bd87-ece2-41be-b873-96928ee8fab9 | https://lpar2rrd.com/note800.php | Release Notes |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xorux:lpar2rrd:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B49D9F5-0510-4191-B286-427ECC02C837", "versionEndIncluding": "8.04", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An API endpoint that should be limited to web application administrators is hidden from, but accessible by, lower-level read only web application users. The endpoint can be used\u00a0to download logs from the appliance configuration, exposing\u00a0sensitive information." }, { "lang": "es", "value": "Un endpoint de API, que deber\u00eda estar limitado a los administradores de aplicaciones web, est\u00e1 oculto, pero es accesible para usuarios de aplicaciones web de solo lectura de nivel inferior. Este endpoint puede usarse para descargar registros de la configuraci\u00f3n del dispositivo, lo que expone informaci\u00f3n confidencial." } ], "id": "CVE-2025-54768", "lastModified": "2025-10-09T17:43:34.683", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-07-29T00:15:24.350", "references": [ { "source": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://korelogic.com/Resources/Advisories/KL-001-2025-015.txt" }, { "source": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "tags": [ "Release Notes" ], "url": "https://lpar2rrd.com/note800.php" } ], "sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-648" } ], "source": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2020-01-10 13:15
Modified
2024-11-21 02:11
Severity ?
Summary
LPAR2RRD ≤ 4.53 and ≤ 3.5 has arbitrary command injection on the application server.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/127593/LPAR2RRD-3.5-4.53-Command-Injection.html | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.openwall.com/lists/oss-security/2014/07/23/6 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/68850 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/94785 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/127593/LPAR2RRD-3.5-4.53-Command-Injection.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2014/07/23/6 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/68850 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/94785 | Third Party Advisory, VDB Entry |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xorux:lpar2rrd:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9EC3D0F-295C-47D0-86F9-9A0B8812BDA8", "versionEndIncluding": "3.50", "vulnerable": true }, { "criteria": "cpe:2.3:a:xorux:lpar2rrd:*:*:*:*:*:*:*:*", "matchCriteriaId": "21088F3F-1608-44CE-A938-EFCA6C3AF722", "versionEndIncluding": "4.53", "versionStartIncluding": "4.00", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "LPAR2RRD \u2264 4.53 and \u2264 3.5 has arbitrary command injection on the application server." }, { "lang": "es", "value": "LPAR2RRD ? 4.53 y ? 3.5 tienen inyecci\u00f3n de comandos arbitrarios en el servidor de aplicaciones" } ], "id": "CVE-2014-4982", "lastModified": "2024-11-21T02:11:13.223", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-10T13:15:12.877", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/127593/LPAR2RRD-3.5-4.53-Command-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2014/07/23/6" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/68850" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94785" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/127593/LPAR2RRD-3.5-4.53-Command-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2014/07/23/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/68850" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94785" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2020-24032 (GCVE-0-2020-24032)
Vulnerability from cvelistv5
Published
2020-08-18 20:15
Modified
2024-08-04 15:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
tz.pl on XoruX LPAR2RRD and STOR2RRD 2.70 virtual appliances allows cmd=set&tz=OS command injection via shell metacharacters in a timezone.
References
▼ | URL | Tags |
---|---|---|
https://www.stor2rrd.com/download.php | x_refsource_MISC | |
https://pastebin.com/dHhawgx8 | x_refsource_MISC | |
https://pastebin.com/G8981Fj8 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:05:11.730Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.stor2rrd.com/download.php" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://pastebin.com/dHhawgx8" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://pastebin.com/G8981Fj8" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "tz.pl on XoruX LPAR2RRD and STOR2RRD 2.70 virtual appliances allows cmd=set\u0026tz=OS command injection via shell metacharacters in a timezone." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-27T12:26:24", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.stor2rrd.com/download.php" }, { "tags": [ "x_refsource_MISC" ], "url": "https://pastebin.com/dHhawgx8" }, { "tags": [ "x_refsource_MISC" ], "url": "https://pastebin.com/G8981Fj8" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-24032", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "tz.pl on XoruX LPAR2RRD and STOR2RRD 2.70 virtual appliances allows cmd=set\u0026tz=OS command injection via shell metacharacters in a timezone." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.stor2rrd.com/download.php", "refsource": "MISC", "url": "https://www.stor2rrd.com/download.php" }, { "name": "https://pastebin.com/dHhawgx8", "refsource": "MISC", "url": "https://pastebin.com/dHhawgx8" }, { "name": "https://pastebin.com/G8981Fj8", "refsource": "MISC", "url": "https://pastebin.com/G8981Fj8" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-24032", "datePublished": "2020-08-18T20:15:45", "dateReserved": "2020-08-13T00:00:00", "dateUpdated": "2024-08-04T15:05:11.730Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-4982 (GCVE-0-2014-4982)
Vulnerability from cvelistv5
Published
2020-01-10 12:56
Modified
2024-08-06 11:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
LPAR2RRD ≤ 4.53 and ≤ 3.5 has arbitrary command injection on the application server.
References
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/127593/LPAR2RRD-3.5-4.53-Command-Injection.html | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2014/07/23/6 | x_refsource_MISC | |
http://www.securityfocus.com/bid/68850 | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/94785 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:34:37.156Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/127593/LPAR2RRD-3.5-4.53-Command-Injection.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/07/23/6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.securityfocus.com/bid/68850" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94785" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "LPAR2RRD \u2264 4.53 and \u2264 3.5 has arbitrary command injection on the application server." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-10T12:56:12", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/127593/LPAR2RRD-3.5-4.53-Command-Injection.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2014/07/23/6" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.securityfocus.com/bid/68850" }, { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94785" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-4982", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "LPAR2RRD \u2264 4.53 and \u2264 3.5 has arbitrary command injection on the application server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/127593/LPAR2RRD-3.5-4.53-Command-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/127593/LPAR2RRD-3.5-4.53-Command-Injection.html" }, { "name": "http://www.openwall.com/lists/oss-security/2014/07/23/6", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2014/07/23/6" }, { "name": "http://www.securityfocus.com/bid/68850", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/68850" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94785", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94785" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-4982", "datePublished": "2020-01-10T12:56:12", "dateReserved": "2014-07-16T00:00:00", "dateUpdated": "2024-08-06T11:34:37.156Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-42371 (GCVE-0-2021-42371)
Vulnerability from cvelistv5
Published
2021-11-08 04:46
Modified
2024-08-04 03:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
lpar2rrd is a hardcoded system account in XoruX LPAR2RRD and STOR2RRD before 7.30.
References
▼ | URL | Tags |
---|---|---|
https://stor2rrd.com/note730.php | x_refsource_CONFIRM | |
https://lpar2rrd.com/note730.php | x_refsource_CONFIRM | |
https://github.com/orangecertcc/security-research/security/advisories/GHSA-p2fq-9h5j-x6w5 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:30:38.368Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://stor2rrd.com/note730.php" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lpar2rrd.com/note730.php" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-p2fq-9h5j-x6w5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "lpar2rrd is a hardcoded system account in XoruX LPAR2RRD and STOR2RRD before 7.30." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-22T15:53:35", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://stor2rrd.com/note730.php" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lpar2rrd.com/note730.php" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-p2fq-9h5j-x6w5" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42371", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "lpar2rrd is a hardcoded system account in XoruX LPAR2RRD and STOR2RRD before 7.30." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://stor2rrd.com/note730.php", "refsource": "CONFIRM", "url": "https://stor2rrd.com/note730.php" }, { "name": "https://lpar2rrd.com/note730.php", "refsource": "CONFIRM", "url": "https://lpar2rrd.com/note730.php" }, { "name": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-p2fq-9h5j-x6w5", "refsource": "MISC", "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-p2fq-9h5j-x6w5" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42371", "datePublished": "2021-11-08T04:46:24", "dateReserved": "2021-10-14T00:00:00", "dateUpdated": "2024-08-04T03:30:38.368Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-42372 (GCVE-0-2021-42372)
Vulnerability from cvelistv5
Published
2021-11-08 04:44
Modified
2024-08-04 03:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A shell command injection in the HW Events SNMP community in XoruX LPAR2RRD and STOR2RRD before 7.30 allows authenticated remote attackers to execute arbitrary shell commands as the user running the service.
References
▼ | URL | Tags |
---|---|---|
https://stor2rrd.com/note730.php | x_refsource_CONFIRM | |
https://lpar2rrd.com/note730.php | x_refsource_CONFIRM | |
https://github.com/orangecertcc/security-research/security/advisories/GHSA-xfw3-pgp3-5j2p | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:30:38.239Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://stor2rrd.com/note730.php" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lpar2rrd.com/note730.php" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-xfw3-pgp3-5j2p" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A shell command injection in the HW Events SNMP community in XoruX LPAR2RRD and STOR2RRD before 7.30 allows authenticated remote attackers to execute arbitrary shell commands as the user running the service." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-22T15:41:34", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://stor2rrd.com/note730.php" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lpar2rrd.com/note730.php" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-xfw3-pgp3-5j2p" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42372", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A shell command injection in the HW Events SNMP community in XoruX LPAR2RRD and STOR2RRD before 7.30 allows authenticated remote attackers to execute arbitrary shell commands as the user running the service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://stor2rrd.com/note730.php", "refsource": "CONFIRM", "url": "https://stor2rrd.com/note730.php" }, { "name": "https://lpar2rrd.com/note730.php", "refsource": "CONFIRM", "url": "https://lpar2rrd.com/note730.php" }, { "name": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-xfw3-pgp3-5j2p", "refsource": "MISC", "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-xfw3-pgp3-5j2p" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42372", "datePublished": "2021-11-08T04:44:21", "dateReserved": "2021-10-14T00:00:00", "dateUpdated": "2024-08-04T03:30:38.239Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-4981 (GCVE-0-2014-4981)
Vulnerability from cvelistv5
Published
2020-02-17 21:21
Modified
2024-08-06 11:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
LPAR2RRD in 3.5 and earlier allows remote attackers to execute arbitrary commands due to insufficient input sanitization of the web GUI parameters.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/68844 | vdb-entry, x_refsource_BID | |
http://packetstormsecurity.com/files/127593/LPAR2RRD-3.5-4.53-Command-Injection.html | x_refsource_MISC | |
http://ocert.org/advisories/ocert-2014-005.html | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2014/07/23/6 | x_refsource_MISC | |
http://www.lpar2rrd.com/note453-01.htm | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/94784 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:34:36.493Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "68844", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/68844" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/127593/LPAR2RRD-3.5-4.53-Command-Injection.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ocert.org/advisories/ocert-2014-005.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/07/23/6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.lpar2rrd.com/note453-01.htm" }, { "name": "94784", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94784" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-07-23T00:00:00", "descriptions": [ { "lang": "en", "value": "LPAR2RRD in 3.5 and earlier allows remote attackers to execute arbitrary commands due to insufficient input sanitization of the web GUI parameters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-17T21:21:42", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "68844", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/68844" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/127593/LPAR2RRD-3.5-4.53-Command-Injection.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://ocert.org/advisories/ocert-2014-005.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2014/07/23/6" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.lpar2rrd.com/note453-01.htm" }, { "name": "94784", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94784" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-4981", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "LPAR2RRD in 3.5 and earlier allows remote attackers to execute arbitrary commands due to insufficient input sanitization of the web GUI parameters." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "68844", "refsource": "BID", "url": "http://www.securityfocus.com/bid/68844" }, { "name": "http://packetstormsecurity.com/files/127593/LPAR2RRD-3.5-4.53-Command-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/127593/LPAR2RRD-3.5-4.53-Command-Injection.html" }, { "name": "http://ocert.org/advisories/ocert-2014-005.html", "refsource": "MISC", "url": "http://ocert.org/advisories/ocert-2014-005.html" }, { "name": "http://www.openwall.com/lists/oss-security/2014/07/23/6", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2014/07/23/6" }, { "name": "http://www.lpar2rrd.com/note453-01.htm", "refsource": "MISC", "url": "http://www.lpar2rrd.com/note453-01.htm" }, { "name": "94784", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94784" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-4981", "datePublished": "2020-02-17T21:21:42", "dateReserved": "2014-07-16T00:00:00", "dateUpdated": "2024-08-06T11:34:36.493Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-42370 (GCVE-0-2021-42370)
Vulnerability from cvelistv5
Published
2021-11-08 04:49
Modified
2024-08-04 03:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A password mismanagement situation exists in XoruX LPAR2RRD and STOR2RRD before 7.30 because cleartext information is present in HTML password input fields in the device properties. (Viewing the passwords requires configuring a web browser to display HTML password input fields.)
References
▼ | URL | Tags |
---|---|---|
https://stor2rrd.com/note730.php | x_refsource_CONFIRM | |
https://lpar2rrd.com/note730.php | x_refsource_CONFIRM | |
https://github.com/orangecertcc/security-research/security/advisories/GHSA-f3qp-4xqq-2wjx | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:30:38.266Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://stor2rrd.com/note730.php" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lpar2rrd.com/note730.php" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-f3qp-4xqq-2wjx" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A password mismanagement situation exists in XoruX LPAR2RRD and STOR2RRD before 7.30 because cleartext information is present in HTML password input fields in the device properties. (Viewing the passwords requires configuring a web browser to display HTML password input fields.)" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-22T17:24:25", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://stor2rrd.com/note730.php" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lpar2rrd.com/note730.php" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-f3qp-4xqq-2wjx" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42370", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A password mismanagement situation exists in XoruX LPAR2RRD and STOR2RRD before 7.30 because cleartext information is present in HTML password input fields in the device properties. (Viewing the passwords requires configuring a web browser to display HTML password input fields.)" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://stor2rrd.com/note730.php", "refsource": "CONFIRM", "url": "https://stor2rrd.com/note730.php" }, { "name": "https://lpar2rrd.com/note730.php", "refsource": "CONFIRM", "url": "https://lpar2rrd.com/note730.php" }, { "name": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-f3qp-4xqq-2wjx", "refsource": "MISC", "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-f3qp-4xqq-2wjx" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42370", "datePublished": "2021-11-08T04:49:28", "dateReserved": "2021-10-14T00:00:00", "dateUpdated": "2024-08-04T03:30:38.266Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-54769 (GCVE-0-2025-54769)
Vulnerability from cvelistv5
Published
2025-07-28 23:34
Modified
2025-07-29 13:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker.
References
▼ | URL | Tags |
---|---|---|
https://korelogic.com/Resources/Advisories/KL-001-2025-016.txt | third-party-advisory | |
https://lpar2rrd.com/note800.php | release-notes |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-54769", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-29T13:20:37.673761Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-29T13:22:11.335Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "platforms": [ "Linux" ], "product": "LPAR2RRD", "vendor": "Xorux", "versions": [ { "status": "affected", "version": "8.04" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "This vulnerability was discovered by Jim Becher of KoreLogic, Inc." } ], "datePublic": "2025-07-28T23:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker." } ], "value": "An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-24", "description": "CWE-24 Path Traversal: \u0027../filedir\u0027", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-648", "description": "CWE-648 Incorrect Use of Privileged APIs", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-28T23:34:38.972Z", "orgId": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "shortName": "KoreLogic" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://korelogic.com/Resources/Advisories/KL-001-2025-016.txt" }, { "tags": [ "release-notes" ], "url": "https://lpar2rrd.com/note800.php" } ], "source": { "discovery": "UNKNOWN" }, "title": "KL-001-2025-016: Xorux LPAR2RRD File Upload Directory Traversal", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "assignerShortName": "KoreLogic", "cveId": "CVE-2025-54769", "datePublished": "2025-07-28T23:34:38.972Z", "dateReserved": "2025-07-28T16:02:18.186Z", "dateUpdated": "2025-07-29T13:22:11.335Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-54767 (GCVE-0-2025-54767)
Vulnerability from cvelistv5
Published
2025-07-28 23:28
Modified
2025-07-29 13:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-648 - Incorrect Use of Privileged APIs
Summary
An authenticated, read-only user can kill any processes running on the Xormon Original virtual appliance as the lpar2rrd user.
References
▼ | URL | Tags |
---|---|---|
https://korelogic.com/Resources/Advisories/KL-001-2025-014.txt | third-party-advisory | |
https://lpar2rrd.com/note800.php | release-notes |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-54767", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-29T13:27:09.488424Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-29T13:28:16.973Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "platforms": [ "Linux" ], "product": "LPAR2RRD", "vendor": "Xorux", "versions": [ { "status": "affected", "version": "8.04" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "This vulnerability was discovered by Jim Becher of KoreLogic, Inc." } ], "datePublic": "2025-07-28T23:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An authenticated, read-only user can kill any processes running on the Xormon Original virtual appliance as the lpar2rrd user." } ], "value": "An authenticated, read-only user can kill any processes running on the Xormon Original virtual appliance as the lpar2rrd user." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-648", "description": "CWE-648: Incorrect Use of Privileged APIs", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-28T23:28:27.996Z", "orgId": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "shortName": "KoreLogic" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://korelogic.com/Resources/Advisories/KL-001-2025-014.txt" }, { "tags": [ "release-notes" ], "url": "https://lpar2rrd.com/note800.php" } ], "source": { "discovery": "UNKNOWN" }, "title": "KL-001-2025-014: Xorux LPAR2RRD Read Only User Denial of Service", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "assignerShortName": "KoreLogic", "cveId": "CVE-2025-54767", "datePublished": "2025-07-28T23:28:27.996Z", "dateReserved": "2025-07-28T16:02:18.186Z", "dateUpdated": "2025-07-29T13:28:16.973Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-54768 (GCVE-0-2025-54768)
Vulnerability from cvelistv5
Published
2025-07-28 23:31
Modified
2025-07-29 13:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-648 - Incorrect Use of Privileged APIs
Summary
An API endpoint that should be limited to web application administrators is hidden from, but accessible by, lower-level read only web application users. The endpoint can be used to download logs from the appliance configuration, exposing sensitive information.
References
▼ | URL | Tags |
---|---|---|
https://korelogic.com/Resources/Advisories/KL-001-2025-015.txt | third-party-advisory | |
https://lpar2rrd.com/note800.php | release-notes |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-54768", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-29T13:28:00.672365Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-29T13:29:38.295Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "platforms": [ "Linux" ], "product": "LPAR2RRD", "vendor": "Xorux", "versions": [ { "status": "affected", "version": "8.04" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "This vulnerability was discovered by Jim Becher of KoreLogic, Inc." } ], "datePublic": "2025-07-28T23:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An API endpoint that should be limited to web application administrators is hidden from, but accessible by, lower-level read only web application users. The endpoint can be used\u0026nbsp;to download logs from the appliance configuration, exposing\u0026nbsp;sensitive information." } ], "value": "An API endpoint that should be limited to web application administrators is hidden from, but accessible by, lower-level read only web application users. The endpoint can be used\u00a0to download logs from the appliance configuration, exposing\u00a0sensitive information." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-648", "description": "CWE-648: Incorrect Use of Privileged APIs", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-28T23:31:09.836Z", "orgId": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "shortName": "KoreLogic" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://korelogic.com/Resources/Advisories/KL-001-2025-015.txt" }, { "tags": [ "release-notes" ], "url": "https://lpar2rrd.com/note800.php" } ], "source": { "discovery": "UNKNOWN" }, "title": "KL-001-2025-015: Xorux LPAR2RRD Read Only User Log Download Exposing Sensitive Information", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "assignerShortName": "KoreLogic", "cveId": "CVE-2025-54768", "datePublished": "2025-07-28T23:31:09.836Z", "dateReserved": "2025-07-28T16:02:18.186Z", "dateUpdated": "2025-07-29T13:29:38.295Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }