← Volver a CVEs
CVE-2018-11116
HIGH8.8
Descripcion
OpenWrt mishandles access control in /etc/config/rpcd and the /usr/share/rpcd/acl.d files, which allows remote authenticated users to call arbitrary methods (i.e., achieve ubus access over HTTP) that were only supposed to be accessible to a specific user, as demonstrated by the file, log, and service namespaces, potentially leading to remote Information Disclosure or Code Execution. NOTE: The developer disputes this as a vulnerability, indicating that rpcd functions appropriately
Detalles CVE
Puntuacion CVSS v3.18.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado6/19/2018
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
openwrt:openwrt
Debilidades (CWE)
CWE-732CWE-732
Referencias
http://blog.hac425.top/2018/05/16/openwrt_rpcd_acl_fail.html(cve@mitre.org)
http://blog.hac425.top/2018/05/16/openwrt_rpcd_acl_fail.html(af854a3a-2127-422b-91ae-364da2661108)
https://forum.openwrt.org/t/rpcd-vulnerability-reported-on-vultdb/16497/3(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.