Vulnerabilites related to pentasecurity - wapples
CVE-2022-35582 (GCVE-0-2022-35582)
Vulnerability from cvelistv5
Published
2022-09-13 22:00
Modified
2024-08-03 09:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Penta Security Systems Inc WAPPLES 4.0.*, 5.0.0.*, 5.0.12.* are vulnerable to Incorrect Access Control. The operating system that WAPPLES runs on has a built-in non-privileged user penta with a predefined password. The password for this user, as well as its existence, is not disclosed in the documentation. Knowing the credentials, attackers can use this feature to gain uncontrolled access to the device and therefore are considered an undocumented possibility for remote control.
References
▼ | URL | Tags |
---|---|---|
https://www.pentasecurity.com/product/wapples/ | x_refsource_MISC | |
https://medium.com/%40_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:36:44.413Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.pentasecurity.com/product/wapples/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://medium.com/%40_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Penta Security Systems Inc WAPPLES 4.0.*, 5.0.0.*, 5.0.12.* are vulnerable to Incorrect Access Control. The operating system that WAPPLES runs on has a built-in non-privileged user penta with a predefined password. The password for this user, as well as its existence, is not disclosed in the documentation. Knowing the credentials, attackers can use this feature to gain uncontrolled access to the device and therefore are considered an undocumented possibility for remote control." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-13T22:00:19", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.pentasecurity.com/product/wapples/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://medium.com/%40_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-35582", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Penta Security Systems Inc WAPPLES 4.0.*, 5.0.0.*, 5.0.12.* are vulnerable to Incorrect Access Control. The operating system that WAPPLES runs on has a built-in non-privileged user penta with a predefined password. The password for this user, as well as its existence, is not disclosed in the documentation. Knowing the credentials, attackers can use this feature to gain uncontrolled access to the device and therefore are considered an undocumented possibility for remote control." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.pentasecurity.com/product/wapples/", "refsource": "MISC", "url": "https://www.pentasecurity.com/product/wapples/" }, { "name": "https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb", "refsource": "MISC", "url": "https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-35582", "datePublished": "2022-09-13T22:00:19", "dateReserved": "2022-07-11T00:00:00", "dateUpdated": "2024-08-03T09:36:44.413Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-31322 (GCVE-0-2022-31322)
Vulnerability from cvelistv5
Published
2022-09-13 22:00
Modified
2024-08-03 07:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Penta Security Systems Inc WAPPLES v6.0 r3 4.10-hotfix1 allows attackers to escalate privileges via overwriting files using SUID flagged executables.
References
▼ | URL | Tags |
---|---|---|
https://www.pentasecurity.com/product/wapples/ | x_refsource_MISC | |
https://medium.com/%40_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:19:05.636Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.pentasecurity.com/product/wapples/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://medium.com/%40_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Penta Security Systems Inc WAPPLES v6.0 r3 4.10-hotfix1 allows attackers to escalate privileges via overwriting files using SUID flagged executables." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-13T22:00:36", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.pentasecurity.com/product/wapples/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://medium.com/%40_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-31322", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Penta Security Systems Inc WAPPLES v6.0 r3 4.10-hotfix1 allows attackers to escalate privileges via overwriting files using SUID flagged executables." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.pentasecurity.com/product/wapples/", "refsource": "MISC", "url": "https://www.pentasecurity.com/product/wapples/" }, { "name": "https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb", "refsource": "MISC", "url": "https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-31322", "datePublished": "2022-09-13T22:00:36", "dateReserved": "2022-05-23T00:00:00", "dateUpdated": "2024-08-03T07:19:05.636Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-35413 (GCVE-0-2022-35413)
Vulnerability from cvelistv5
Published
2022-09-13 22:00
Modified
2024-08-03 09:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
WAPPLES through 6.0 has a hardcoded systemi account. A threat actor could use this account to access the system configuration and confidential information (such as SSL keys) via an HTTPS request to the /webapi/ URI on port 443 or 5001.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:36:44.148Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.pentasecurity.com/product/wapples/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://azuremarketplace.microsoft.com/en/marketplace/apps/penta-security-systems-inc.wapples_sa_v6?tab=Overview" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://medium.com/%40_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "WAPPLES through 6.0 has a hardcoded systemi account. A threat actor could use this account to access the system configuration and confidential information (such as SSL keys) via an HTTPS request to the /webapi/ URI on port 443 or 5001." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-26T13:36:33", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.pentasecurity.com/product/wapples/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://azuremarketplace.microsoft.com/en/marketplace/apps/penta-security-systems-inc.wapples_sa_v6?tab=Overview" }, { "tags": [ "x_refsource_MISC" ], "url": "https://medium.com/%40_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-35413", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "WAPPLES through 6.0 has a hardcoded systemi account. A threat actor could use this account to access the system configuration and confidential information (such as SSL keys) via an HTTPS request to the /webapi/ URI on port 443 or 5001." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.pentasecurity.com/product/wapples/", "refsource": "MISC", "url": "https://www.pentasecurity.com/product/wapples/" }, { "name": "https://azuremarketplace.microsoft.com/en/marketplace/apps/penta-security-systems-inc.wapples_sa_v6?tab=Overview", "refsource": "MISC", "url": "https://azuremarketplace.microsoft.com/en/marketplace/apps/penta-security-systems-inc.wapples_sa_v6?tab=Overview" }, { "name": "https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb", "refsource": "MISC", "url": "https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-35413", "datePublished": "2022-09-13T22:00:24", "dateReserved": "2022-07-08T00:00:00", "dateUpdated": "2024-08-03T09:36:44.148Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-31324 (GCVE-0-2022-31324)
Vulnerability from cvelistv5
Published
2022-09-13 22:00
Modified
2024-08-03 07:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An arbitrary file download vulnerability in the downloadAction() function of Penta Security Systems Inc WAPPLES v6.0 r3 4.10-hotfix1 allows attackers to download arbitrary files via a crafted POST request.
References
▼ | URL | Tags |
---|---|---|
https://www.pentasecurity.com/product/wapples/ | x_refsource_MISC | |
https://medium.com/%40_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:19:05.639Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.pentasecurity.com/product/wapples/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://medium.com/%40_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An arbitrary file download vulnerability in the downloadAction() function of Penta Security Systems Inc WAPPLES v6.0 r3 4.10-hotfix1 allows attackers to download arbitrary files via a crafted POST request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-13T22:00:31", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.pentasecurity.com/product/wapples/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://medium.com/%40_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-31324", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An arbitrary file download vulnerability in the downloadAction() function of Penta Security Systems Inc WAPPLES v6.0 r3 4.10-hotfix1 allows attackers to download arbitrary files via a crafted POST request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.pentasecurity.com/product/wapples/", "refsource": "MISC", "url": "https://www.pentasecurity.com/product/wapples/" }, { "name": "https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb", "refsource": "MISC", "url": "https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-31324", "datePublished": "2022-09-13T22:00:31", "dateReserved": "2022-05-23T00:00:00", "dateUpdated": "2024-08-03T07:19:05.639Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2022-09-13 22:15
Modified
2024-11-21 07:11
Severity ?
Summary
Penta Security Systems Inc WAPPLES 4.0.*, 5.0.0.*, 5.0.12.* are vulnerable to Incorrect Access Control. The operating system that WAPPLES runs on has a built-in non-privileged user penta with a predefined password. The password for this user, as well as its existence, is not disclosed in the documentation. Knowing the credentials, attackers can use this feature to gain uncontrolled access to the device and therefore are considered an undocumented possibility for remote control.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
pentasecurity | wapples | 4.0.0 | |
pentasecurity | wapples | 5.0.0.0 | |
pentasecurity | wapples | 5.0.12.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pentasecurity:wapples:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DE796237-2504-4F54-9364-E1E6E7D18106", "vulnerable": true }, { "criteria": "cpe:2.3:a:pentasecurity:wapples:5.0.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F701EA6A-95C0-45CC-9AF7-6FAC5393A7EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:pentasecurity:wapples:5.0.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "B0D0ECAB-927C-4EF5-A50E-0B978F63D11D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Penta Security Systems Inc WAPPLES 4.0.*, 5.0.0.*, 5.0.12.* are vulnerable to Incorrect Access Control. The operating system that WAPPLES runs on has a built-in non-privileged user penta with a predefined password. The password for this user, as well as its existence, is not disclosed in the documentation. Knowing the credentials, attackers can use this feature to gain uncontrolled access to the device and therefore are considered an undocumented possibility for remote control." }, { "lang": "es", "value": "Penta Security Systems Inc WAPPLES versiones 4.0.*, 5.0.0.*, 5.0.12.* son vulnerables a un Control de Acceso Incorrecto. El sistema operativo en el que es ejecutado WAPPLES presenta incorporado un usuario no privilegiado penta con una contrase\u00f1a predefinida. La contrase\u00f1a de este usuario, as\u00ed como su existencia, no es divulgada en la documentaci\u00f3n. Conociendo las credenciales, los atacantes pueden usar esta caracter\u00edstica para conseguir un acceso no controlado al dispositivo, por lo que es considerada una posibilidad no documentada de control remoto" } ], "id": "CVE-2022-35582", "lastModified": "2024-11-21T07:11:20.903", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-13T22:15:09.130", "references": [ { "source": "cve@mitre.org", "url": "https://medium.com/%40_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.pentasecurity.com/product/wapples/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://medium.com/%40_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.pentasecurity.com/product/wapples/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-09-13 22:15
Modified
2024-11-21 07:11
Severity ?
Summary
WAPPLES through 6.0 has a hardcoded systemi account. A threat actor could use this account to access the system configuration and confidential information (such as SSL keys) via an HTTPS request to the /webapi/ URI on port 443 or 5001.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://azuremarketplace.microsoft.com/en/marketplace/apps/penta-security-systems-inc.wapples_sa_v6?tab=Overview | Patch, Product, Third Party Advisory, Vendor Advisory | |
cve@mitre.org | https://medium.com/%40_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb | ||
cve@mitre.org | https://www.pentasecurity.com/product/wapples/ | Product, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://azuremarketplace.microsoft.com/en/marketplace/apps/penta-security-systems-inc.wapples_sa_v6?tab=Overview | Patch, Product, Third Party Advisory, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://medium.com/%40_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.pentasecurity.com/product/wapples/ | Product, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
pentasecurity | wapples | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pentasecurity:wapples:*:*:*:*:*:*:*:*", "matchCriteriaId": "53C41126-BB55-42C4-84C6-EE4863A26B12", "versionEndIncluding": "6.0.0", "versionStartIncluding": "4.0.54.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "WAPPLES through 6.0 has a hardcoded systemi account. A threat actor could use this account to access the system configuration and confidential information (such as SSL keys) via an HTTPS request to the /webapi/ URI on port 443 or 5001." }, { "lang": "es", "value": "WAPPLES hasta la versi\u00f3n 6.0 tiene una cuenta systemi codificada. Un actor de la amenaza podr\u00eda utilizar esta cuenta para acceder a la configuraci\u00f3n del sistema y a la informaci\u00f3n confidencial (como las claves SSL) a trav\u00e9s de una solicitud HTTPS al URI /webapi/ en el puerto 443 o 5001" } ], "id": "CVE-2022-35413", "lastModified": "2024-11-21T07:11:07.760", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-13T22:15:09.080", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Product", "Third Party Advisory", "Vendor Advisory" ], "url": "https://azuremarketplace.microsoft.com/en/marketplace/apps/penta-security-systems-inc.wapples_sa_v6?tab=Overview" }, { "source": "cve@mitre.org", "url": "https://medium.com/%40_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.pentasecurity.com/product/wapples/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Product", "Third Party Advisory", "Vendor Advisory" ], "url": "https://azuremarketplace.microsoft.com/en/marketplace/apps/penta-security-systems-inc.wapples_sa_v6?tab=Overview" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://medium.com/%40_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.pentasecurity.com/product/wapples/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-09-13 22:15
Modified
2024-11-21 07:04
Severity ?
Summary
An arbitrary file download vulnerability in the downloadAction() function of Penta Security Systems Inc WAPPLES v6.0 r3 4.10-hotfix1 allows attackers to download arbitrary files via a crafted POST request.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
pentasecurity | wapples | * | |
pentasecurity | wapples | v6.0.r3.4.10 | |
pentasecurity | wapples | v6.0.r3.4.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pentasecurity:wapples:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA87F446-9EC8-484E-9618-4D746EE4072A", "versionEndExcluding": "6.0.r3.4.10", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:pentasecurity:wapples:v6.0.r3.4.10:-:*:*:*:*:*:*", "matchCriteriaId": "7A617435-7F9A-4491-B01F-9FCBA90737DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:pentasecurity:wapples:v6.0.r3.4.10:hotfix1:*:*:*:*:*:*", "matchCriteriaId": "8374F788-40A3-45BB-8A0E-DB0A454DAB88", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An arbitrary file download vulnerability in the downloadAction() function of Penta Security Systems Inc WAPPLES v6.0 r3 4.10-hotfix1 allows attackers to download arbitrary files via a crafted POST request." }, { "lang": "es", "value": "Una vulnerabilidad de descarga de archivos arbitrarios en la funci\u00f3n downloadAction() de Penta Security Systems Inc WAPPLES versi\u00f3n v6.0 r3 4.10-hotfix1, permite a atacantes descargar archivos arbitrarios por medio de una petici\u00f3n POST dise\u00f1ada" } ], "id": "CVE-2022-31324", "lastModified": "2024-11-21T07:04:20.153", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-13T22:15:08.903", "references": [ { "source": "cve@mitre.org", "url": "https://medium.com/%40_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.pentasecurity.com/product/wapples/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://medium.com/%40_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.pentasecurity.com/product/wapples/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-494" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-09-13 22:15
Modified
2024-11-21 07:04
Severity ?
Summary
Penta Security Systems Inc WAPPLES v6.0 r3 4.10-hotfix1 allows attackers to escalate privileges via overwriting files using SUID flagged executables.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
pentasecurity | wapples | * | |
pentasecurity | wapples | v6.0.r3.4.10 | |
pentasecurity | wapples | v6.0.r3.4.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pentasecurity:wapples:*:*:*:*:*:*:*:*", "matchCriteriaId": "378AF884-674A-4F98-8885-EF6FEC2DB645", "versionEndExcluding": "6.0.r3.4.10", "versionStartIncluding": "5.0.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:pentasecurity:wapples:v6.0.r3.4.10:-:*:*:*:*:*:*", "matchCriteriaId": "7A617435-7F9A-4491-B01F-9FCBA90737DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:pentasecurity:wapples:v6.0.r3.4.10:hotfix1:*:*:*:*:*:*", "matchCriteriaId": "8374F788-40A3-45BB-8A0E-DB0A454DAB88", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Penta Security Systems Inc WAPPLES v6.0 r3 4.10-hotfix1 allows attackers to escalate privileges via overwriting files using SUID flagged executables." }, { "lang": "es", "value": "Penta Security Systems Inc WAPPLES versi\u00f3n v6.0 r3 4.10-hotfix1, permite a atacantes escalar privilegios por medio de la sobreescritura de archivos usando ejecutables marcados como SUID" } ], "id": "CVE-2022-31322", "lastModified": "2024-11-21T07:04:19.990", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-13T22:15:08.860", "references": [ { "source": "cve@mitre.org", "url": "https://medium.com/%40_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.pentasecurity.com/product/wapples/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://medium.com/%40_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.pentasecurity.com/product/wapples/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }