ID CVE-2018-11798
Summary The Apache Thrift Node.js static web server in versions 0.9.2 through 0.11.0 have been determined to contain a security vulnerability in which a remote user has the ability to access files outside the set webservers docroot path.
References
Vulnerable Configurations
  • cpe:2.3:a:apache:thrift:0.9.2:*:*:*:*:node.js:*:*
    cpe:2.3:a:apache:thrift:0.9.2:*:*:*:*:node.js:*:*
  • cpe:2.3:a:apache:thrift:0.9.3:*:*:*:*:node.js:*:*
    cpe:2.3:a:apache:thrift:0.9.3:*:*:*:*:node.js:*:*
  • cpe:2.3:a:apache:thrift:0.10.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:apache:thrift:0.10.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:apache:thrift:0.11.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:apache:thrift:0.11.0:*:*:*:*:node.js:*:*
CVSS
Base: 4.0 (as of 19-06-2019 - 00:15)
Impact:
Exploitability:
CWE CWE-538
CAPEC
  • WSDL Scanning
    This attack targets the WSDL interface made available by a web service. The attacker may scan the WSDL interface to reveal sensitive information about invocation patterns, underlying technology implementations and associated vulnerabilities. This type of probing is carried out to perform more serious attacks (e.g. parameter tampering, malicious content injection, command injection, etc.). WSDL files provide detailed information about the services ports and bindings available to consumers. For instance, the attacker can submit special characters or malicious content to the Web service and can cause a denial of service condition or illegal access to database records. In addition, the attacker may try to guess other private methods by using the information provided in the WSDL files.
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:S/C:P/I:N/A:N
redhat via4
advisories
  • rhsa
    id RHSA-2019:1545
  • rhsa
    id RHSA-2019:3140
refmap via4
bid 106501
misc
Last major update 19-06-2019 - 00:15
Published 07-01-2019 - 17:29
Last modified 19-06-2019 - 00:15
Back to Top