var-201509-0346
Vulnerability from variot
Endian Firewall before 3.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) NEW_PASSWORD_1 or (2) NEW_PASSWORD_2 parameter to cgi-bin/chpasswd.cgi. Supplementary information : CWE Vulnerability type by CWE-77: Improper Neutralization of Special Elements used in a Command ( Command injection ) Has been identified. Versions prior to Endian Firewall 3.0 are vulnerable. Endian Firewall is a set of unified risk management tools based on the Red Hat Enterprise Linux operating system developed by Italian company Endian. The tool provides HTTP/FTP virus protection, POP3/SMTP virus protection, SSL/TLS virtual private network and other functions
Show details on source website{ affected_products: { _id: null, data: [ { _id: null, model: "endian firewall", scope: "lte", trust: 1, vendor: "endian firewall", version: "2.5.1", }, { _id: null, model: "firewall", scope: "lt", trust: 0.8, vendor: "endian", version: "3.0", }, { _id: null, model: "endian firewall", scope: "eq", trust: 0.6, vendor: "endian firewall", version: "2.5.1", }, { _id: null, model: "firewall", scope: "eq", trust: 0.3, vendor: "endian", version: "2.5.1", }, { _id: null, model: "firewall", scope: "eq", trust: 0.3, vendor: "endian", version: "2.1.2", }, { _id: null, model: "firewall", scope: "ne", trust: 0.3, vendor: "endian", version: "3.0", }, ], sources: [ { db: "BID", id: "76865", }, { db: "JVNDB", id: "JVNDB-2015-004985", }, { db: "CNNVD", id: "CNNVD-201509-574", }, { db: "NVD", id: "CVE-2015-5082", }, ], }, configurations: { _id: null, data: [ { CVE_data_version: "4.0", nodes: [ { cpe_match: [ { cpe22Uri: "cpe:/a:endian:firewall", vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "JVNDB", id: "JVNDB-2015-004985", }, ], }, credits: { _id: null, data: "Ben Lincoln", sources: [ { db: "BID", id: "76865", }, ], trust: 0.3, }, cve: "CVE-2015-5082", cvss: { _id: null, data: [ { cvssV2: [ { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "nvd@nist.gov", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", exploitabilityScore: 10, id: "CVE-2015-5082", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 1.9, vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", exploitabilityScore: 10, id: "VHN-83043", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.1, vectorString: "AV:N/AC:L/AU:N/C:C/I:C/A:C", version: "2.0", }, ], cvssV3: [], severity: [ { author: "nvd@nist.gov", id: "CVE-2015-5082", trust: 1, value: "HIGH", }, { author: "NVD", id: "CVE-2015-5082", trust: 0.8, value: "High", }, { author: "CNNVD", id: "CNNVD-201509-574", trust: 0.6, value: "CRITICAL", }, { author: "VULHUB", id: "VHN-83043", trust: 0.1, value: "HIGH", }, { author: "VULMON", id: "CVE-2015-5082", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "VULHUB", id: "VHN-83043", }, { db: "VULMON", id: "CVE-2015-5082", }, { db: "JVNDB", id: "JVNDB-2015-004985", }, { db: "CNNVD", id: "CNNVD-201509-574", }, { db: "NVD", id: "CVE-2015-5082", }, ], }, description: { _id: null, data: "Endian Firewall before 3.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) NEW_PASSWORD_1 or (2) NEW_PASSWORD_2 parameter to cgi-bin/chpasswd.cgi. Supplementary information : CWE Vulnerability type by CWE-77: Improper Neutralization of Special Elements used in a Command ( Command injection ) Has been identified. \nVersions prior to Endian Firewall 3.0 are vulnerable. Endian Firewall is a set of unified risk management tools based on the Red Hat Enterprise Linux operating system developed by Italian company Endian. The tool provides HTTP/FTP virus protection, POP3/SMTP virus protection, SSL/TLS virtual private network and other functions", sources: [ { db: "NVD", id: "CVE-2015-5082", }, { db: "JVNDB", id: "JVNDB-2015-004985", }, { db: "BID", id: "76865", }, { db: "VULHUB", id: "VHN-83043", }, { db: "VULMON", id: "CVE-2015-5082", }, ], trust: 2.07, }, exploit_availability: { _id: null, data: [ { reference: "https://vulmon.com/exploitdetails?qidtp=exploitdb&qid=38096", trust: 0.3, type: "exploit", }, { reference: "https://www.scap.org.cn/vuln/vhn-83043", trust: 0.1, type: "unknown", }, ], sources: [ { db: "VULHUB", id: "VHN-83043", }, { db: "VULMON", id: "CVE-2015-5082", }, ], }, external_ids: { _id: null, data: [ { db: "NVD", id: "CVE-2015-5082", trust: 2.9, }, { db: "PACKETSTORM", id: "133469", trust: 2.6, }, { db: "EXPLOIT-DB", id: "38096", trust: 1.8, }, { db: "EXPLOIT-DB", id: "37428", trust: 1.8, }, { db: "EXPLOIT-DB", id: "37426", trust: 1.8, }, { db: "JVNDB", id: "JVNDB-2015-004985", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201509-574", trust: 0.7, }, { db: "BID", id: "76865", trust: 0.4, }, { db: "VULHUB", id: "VHN-83043", trust: 0.1, }, { db: "VULMON", id: "CVE-2015-5082", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-83043", }, { db: "VULMON", id: "CVE-2015-5082", }, { db: "BID", id: "76865", }, { db: "JVNDB", id: "JVNDB-2015-004985", }, { db: "CNNVD", id: "CNNVD-201509-574", }, { db: "NVD", id: "CVE-2015-5082", }, ], }, id: "VAR-201509-0346", iot: { _id: null, data: true, sources: [ { db: "VULHUB", id: "VHN-83043", }, ], trust: 0.6625, }, last_update_date: "2024-11-23T22:27:04.942000Z", patch: { _id: null, data: [ { title: "Endian Firewall Community", trust: 0.8, url: "http://www.endian.com/community/download/", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2015-004985", }, ], }, problemtype_data: { _id: null, data: [ { problemtype: "CWE-77", trust: 1.1, }, { problemtype: "CWE-Other", trust: 0.8, }, ], sources: [ { db: "VULHUB", id: "VHN-83043", }, { db: "JVNDB", id: "JVNDB-2015-004985", }, { db: "NVD", id: "CVE-2015-5082", }, ], }, references: { _id: null, data: [ { trust: 2.6, url: "http://packetstormsecurity.com/files/133469/endian-firewall-proxy-password-change-command-injection.html", }, { trust: 1.9, url: "https://www.exploit-db.com/exploits/38096/", }, { trust: 1.8, url: "https://www.exploit-db.com/exploits/37426/", }, { trust: 1.8, url: "https://www.exploit-db.com/exploits/37428/", }, { trust: 1.3, url: "http://www.rapid7.com/db/modules/exploit/linux/http/efw_chpasswd_exec", }, { trust: 0.8, url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5082", }, { trust: 0.8, url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-5082", }, { trust: 0.3, url: "http://www.endian.com/en/products/firewall/appliances/", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/77.html", }, { trust: 0.1, url: "http://tools.cisco.com/security/center/viewalert.x?alertid=41433", }, { trust: 0.1, url: "https://nvd.nist.gov", }, ], sources: [ { db: "VULHUB", id: "VHN-83043", }, { db: "VULMON", id: "CVE-2015-5082", }, { db: "BID", id: "76865", }, { db: "JVNDB", id: "JVNDB-2015-004985", }, { db: "CNNVD", id: "CNNVD-201509-574", }, { db: "NVD", id: "CVE-2015-5082", }, ], }, sources: { _id: null, data: [ { db: "VULHUB", id: "VHN-83043", ident: null, }, { db: "VULMON", id: "CVE-2015-5082", ident: null, }, { db: "BID", id: "76865", ident: null, }, { db: "JVNDB", id: "JVNDB-2015-004985", ident: null, }, { db: "CNNVD", id: "CNNVD-201509-574", ident: null, }, { db: "NVD", id: "CVE-2015-5082", ident: null, }, ], }, sources_release_date: { _id: null, data: [ { date: "2015-09-28T00:00:00", db: "VULHUB", id: "VHN-83043", ident: null, }, { date: "2015-09-28T00:00:00", db: "VULMON", id: "CVE-2015-5082", ident: null, }, { date: "2015-09-29T00:00:00", db: "BID", id: "76865", ident: null, }, { date: "2015-10-01T00:00:00", db: "JVNDB", id: "JVNDB-2015-004985", ident: null, }, { date: "2015-09-30T00:00:00", db: "CNNVD", id: "CNNVD-201509-574", ident: null, }, { date: "2015-09-28T15:59:00.097000", db: "NVD", id: "CVE-2015-5082", ident: null, }, ], }, sources_update_date: { _id: null, data: [ { date: "2016-12-08T00:00:00", db: "VULHUB", id: "VHN-83043", ident: null, }, { date: "2016-12-08T00:00:00", db: "VULMON", id: "CVE-2015-5082", ident: null, }, { date: "2015-09-29T00:00:00", db: "BID", id: "76865", ident: null, }, { date: "2015-10-01T00:00:00", db: "JVNDB", id: "JVNDB-2015-004985", ident: null, }, { date: "2015-09-30T00:00:00", db: "CNNVD", id: "CNNVD-201509-574", ident: null, }, { date: "2024-11-21T02:32:18.203000", db: "NVD", id: "CVE-2015-5082", ident: null, }, ], }, threat_type: { _id: null, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-201509-574", }, ], trust: 0.6, }, title: { _id: null, data: "Endian Firewall Vulnerable to arbitrary command execution", sources: [ { db: "JVNDB", id: "JVNDB-2015-004985", }, ], trust: 0.8, }, type: { _id: null, data: "operating system commend injection", sources: [ { db: "CNNVD", id: "CNNVD-201509-574", }, ], trust: 0.6, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.