var-201509-0346
Vulnerability from variot

Endian Firewall before 3.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) NEW_PASSWORD_1 or (2) NEW_PASSWORD_2 parameter to cgi-bin/chpasswd.cgi. Supplementary information : CWE Vulnerability type by CWE-77: Improper Neutralization of Special Elements used in a Command ( Command injection ) Has been identified. Versions prior to Endian Firewall 3.0 are vulnerable. Endian Firewall is a set of unified risk management tools based on the Red Hat Enterprise Linux operating system developed by Italian company Endian. The tool provides HTTP/FTP virus protection, POP3/SMTP virus protection, SSL/TLS virtual private network and other functions

Show details on source website


{
   affected_products: {
      _id: null,
      data: [
         {
            _id: null,
            model: "endian firewall",
            scope: "lte",
            trust: 1,
            vendor: "endian firewall",
            version: "2.5.1",
         },
         {
            _id: null,
            model: "firewall",
            scope: "lt",
            trust: 0.8,
            vendor: "endian",
            version: "3.0",
         },
         {
            _id: null,
            model: "endian firewall",
            scope: "eq",
            trust: 0.6,
            vendor: "endian firewall",
            version: "2.5.1",
         },
         {
            _id: null,
            model: "firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "endian",
            version: "2.5.1",
         },
         {
            _id: null,
            model: "firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "endian",
            version: "2.1.2",
         },
         {
            _id: null,
            model: "firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "endian",
            version: "3.0",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "76865",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-004985",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201509-574",
         },
         {
            db: "NVD",
            id: "CVE-2015-5082",
         },
      ],
   },
   configurations: {
      _id: null,
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:endian:firewall",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-004985",
         },
      ],
   },
   credits: {
      _id: null,
      data: "Ben Lincoln",
      sources: [
         {
            db: "BID",
            id: "76865",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2015-5082",
   cvss: {
      _id: null,
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "COMPLETE",
                  baseScore: 10,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 10,
                  id: "CVE-2015-5082",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 1.9,
                  vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 10,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 10,
                  id: "VHN-83043",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2015-5082",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "NVD",
                  id: "CVE-2015-5082",
                  trust: 0.8,
                  value: "High",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201509-574",
                  trust: 0.6,
                  value: "CRITICAL",
               },
               {
                  author: "VULHUB",
                  id: "VHN-83043",
                  trust: 0.1,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2015-5082",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-83043",
         },
         {
            db: "VULMON",
            id: "CVE-2015-5082",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-004985",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201509-574",
         },
         {
            db: "NVD",
            id: "CVE-2015-5082",
         },
      ],
   },
   description: {
      _id: null,
      data: "Endian Firewall before 3.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) NEW_PASSWORD_1 or (2) NEW_PASSWORD_2 parameter to cgi-bin/chpasswd.cgi. Supplementary information : CWE Vulnerability type by CWE-77: Improper Neutralization of Special Elements used in a Command ( Command injection ) Has been identified. \nVersions prior to Endian Firewall 3.0 are vulnerable. Endian Firewall is a set of unified risk management tools based on the Red Hat Enterprise Linux operating system developed by Italian company Endian. The tool provides HTTP/FTP virus protection, POP3/SMTP virus protection, SSL/TLS virtual private network and other functions",
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-5082",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-004985",
         },
         {
            db: "BID",
            id: "76865",
         },
         {
            db: "VULHUB",
            id: "VHN-83043",
         },
         {
            db: "VULMON",
            id: "CVE-2015-5082",
         },
      ],
      trust: 2.07,
   },
   exploit_availability: {
      _id: null,
      data: [
         {
            reference: "https://vulmon.com/exploitdetails?qidtp=exploitdb&qid=38096",
            trust: 0.3,
            type: "exploit",
         },
         {
            reference: "https://www.scap.org.cn/vuln/vhn-83043",
            trust: 0.1,
            type: "unknown",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-83043",
         },
         {
            db: "VULMON",
            id: "CVE-2015-5082",
         },
      ],
   },
   external_ids: {
      _id: null,
      data: [
         {
            db: "NVD",
            id: "CVE-2015-5082",
            trust: 2.9,
         },
         {
            db: "PACKETSTORM",
            id: "133469",
            trust: 2.6,
         },
         {
            db: "EXPLOIT-DB",
            id: "38096",
            trust: 1.8,
         },
         {
            db: "EXPLOIT-DB",
            id: "37428",
            trust: 1.8,
         },
         {
            db: "EXPLOIT-DB",
            id: "37426",
            trust: 1.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-004985",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201509-574",
            trust: 0.7,
         },
         {
            db: "BID",
            id: "76865",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-83043",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2015-5082",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-83043",
         },
         {
            db: "VULMON",
            id: "CVE-2015-5082",
         },
         {
            db: "BID",
            id: "76865",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-004985",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201509-574",
         },
         {
            db: "NVD",
            id: "CVE-2015-5082",
         },
      ],
   },
   id: "VAR-201509-0346",
   iot: {
      _id: null,
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-83043",
         },
      ],
      trust: 0.6625,
   },
   last_update_date: "2024-11-23T22:27:04.942000Z",
   patch: {
      _id: null,
      data: [
         {
            title: "Endian Firewall Community",
            trust: 0.8,
            url: "http://www.endian.com/community/download/",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-004985",
         },
      ],
   },
   problemtype_data: {
      _id: null,
      data: [
         {
            problemtype: "CWE-77",
            trust: 1.1,
         },
         {
            problemtype: "CWE-Other",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-83043",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-004985",
         },
         {
            db: "NVD",
            id: "CVE-2015-5082",
         },
      ],
   },
   references: {
      _id: null,
      data: [
         {
            trust: 2.6,
            url: "http://packetstormsecurity.com/files/133469/endian-firewall-proxy-password-change-command-injection.html",
         },
         {
            trust: 1.9,
            url: "https://www.exploit-db.com/exploits/38096/",
         },
         {
            trust: 1.8,
            url: "https://www.exploit-db.com/exploits/37426/",
         },
         {
            trust: 1.8,
            url: "https://www.exploit-db.com/exploits/37428/",
         },
         {
            trust: 1.3,
            url: "http://www.rapid7.com/db/modules/exploit/linux/http/efw_chpasswd_exec",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5082",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-5082",
         },
         {
            trust: 0.3,
            url: "http://www.endian.com/en/products/firewall/appliances/",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/77.html",
         },
         {
            trust: 0.1,
            url: "http://tools.cisco.com/security/center/viewalert.x?alertid=41433",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-83043",
         },
         {
            db: "VULMON",
            id: "CVE-2015-5082",
         },
         {
            db: "BID",
            id: "76865",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-004985",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201509-574",
         },
         {
            db: "NVD",
            id: "CVE-2015-5082",
         },
      ],
   },
   sources: {
      _id: null,
      data: [
         {
            db: "VULHUB",
            id: "VHN-83043",
            ident: null,
         },
         {
            db: "VULMON",
            id: "CVE-2015-5082",
            ident: null,
         },
         {
            db: "BID",
            id: "76865",
            ident: null,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-004985",
            ident: null,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201509-574",
            ident: null,
         },
         {
            db: "NVD",
            id: "CVE-2015-5082",
            ident: null,
         },
      ],
   },
   sources_release_date: {
      _id: null,
      data: [
         {
            date: "2015-09-28T00:00:00",
            db: "VULHUB",
            id: "VHN-83043",
            ident: null,
         },
         {
            date: "2015-09-28T00:00:00",
            db: "VULMON",
            id: "CVE-2015-5082",
            ident: null,
         },
         {
            date: "2015-09-29T00:00:00",
            db: "BID",
            id: "76865",
            ident: null,
         },
         {
            date: "2015-10-01T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-004985",
            ident: null,
         },
         {
            date: "2015-09-30T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201509-574",
            ident: null,
         },
         {
            date: "2015-09-28T15:59:00.097000",
            db: "NVD",
            id: "CVE-2015-5082",
            ident: null,
         },
      ],
   },
   sources_update_date: {
      _id: null,
      data: [
         {
            date: "2016-12-08T00:00:00",
            db: "VULHUB",
            id: "VHN-83043",
            ident: null,
         },
         {
            date: "2016-12-08T00:00:00",
            db: "VULMON",
            id: "CVE-2015-5082",
            ident: null,
         },
         {
            date: "2015-09-29T00:00:00",
            db: "BID",
            id: "76865",
            ident: null,
         },
         {
            date: "2015-10-01T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-004985",
            ident: null,
         },
         {
            date: "2015-09-30T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201509-574",
            ident: null,
         },
         {
            date: "2024-11-21T02:32:18.203000",
            db: "NVD",
            id: "CVE-2015-5082",
            ident: null,
         },
      ],
   },
   threat_type: {
      _id: null,
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201509-574",
         },
      ],
      trust: 0.6,
   },
   title: {
      _id: null,
      data: "Endian Firewall Vulnerable to arbitrary command execution",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-004985",
         },
      ],
      trust: 0.8,
   },
   type: {
      _id: null,
      data: "operating system commend injection",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201509-574",
         },
      ],
      trust: 0.6,
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.