Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on May 2nd, 2019 📆 | 7945 Views ⚑

0

Apache Axis up to 1.7.8 Server-Side Request Forgery [CVE-2019-0227]


Text to Speech Demo

CVSS Meta Temp Score Current Exploit Price (≈)
5.3 $5k-$25k

A vulnerability, which was classified as critical, has been found in Apache Axis up to 1.7.8. This issue affects some functionality. The manipulation with an unknown input leads to a privilege escalation vulnerability (SSRF). Using CWE to declare the problem leads to CWE-918. Impacted is confidentiality, integrity, and availability.

The weakness was released 05/01/2019. The identification of this vulnerability is CVE-2019-0227 since 11/14/2018. The technical details are unknown and an exploit is not publicly available. The pricing for an exploit might be around USD $5k-$25k at the moment (estimation calculated on 05/02/2019).

Upgrading to version 1.7.9 eliminates this vulnerability.

Vendor

Name

VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.3

VulDB Base Score: ≈5.5
VulDB Temp Score: ≈5.3
VulDB Vector: ?
VulDB Reliability: ?

VulDB Base Score: ?
VulDB Temp Score: ?
VulDB Reliability: ?
Class: Privilege escalation / SSRF (CWE-918)
Local: Yes
Remote: No

Availability: ?
Status: Not defined





Price Prediction: ?
Current Price Estimation: ?


0-Day unlock unlock unlock unlock
Today unlock unlock unlock unlock

Threat Intelligenceinfoedit

Threat: ?
Adversaries: ?
Geopolitics: ?
Economy: ?
Predictions: ?
Remediation: ?Recommended: Upgrade
Status: ?
0-Day Time: ?

Upgrade: Axis 1.7.9

11/14/2018 CVE assigned
05/01/2019 +168 days Advisory disclosed
05/02/2019 +1 days VulDB entry created
05/02/2019 +0 days VulDB last updateCVE: CVE-2019-0227 (?)Created: 05/02/2019 06:57 AM
Complete: ?

Enable the mail alert feature now!

https://vuldb.com/?id.134291

Tagged with:



Comments are closed.