Published on May 11th, 2019 📆 | 6785 Views ⚑
0LightOpenID up to 1.3.1 openid.php Request Server-Side Request Forgery
CVSS Meta Temp Score | Current Exploit Price (≈) |
---|---|
5.5 | $0-$5k |
A vulnerability was found in LightOpenID up to 1.3.1. It has been declared as critical. Affected by this vulnerability is a code block of the file openid.php. The manipulation as part of a Request leads to a privilege escalation vulnerability (SSRF). The CWE definition for the vulnerability is CWE-918. As an impact it is known to affect confidentiality, integrity, and availability. The summary by CVE is:
openid.php in LightOpenID through 1.3.1 allows SSRF via a crafted OpenID 2.0 assertion request using the HTTP GET method.
The weakness was published 05/10/2019. This vulnerability is known as CVE-2019-11066 since 04/09/2019. Technical details of the vulnerability are known, but there is no available exploit. The pricing for an exploit might be around USD $0-$5k at the moment (estimation calculated on 05/11/2019).
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Name
VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.5
VulDB Base Score: ≈5.5
VulDB Temp Score: ≈5.5
VulDB Vector: ?
VulDB Reliability: ?
VulDB Base Score: ?
VulDB Temp Score: ?
VulDB Reliability: ?
Class: Privilege escalation / SSRF (CWE-918)
Local: Yes
Remote: No
Availability: ?
Status: Not defined
Price Prediction: ?
Current Price Estimation: ?
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Threat: ?
Adversaries: ?
Geopolitics: ?
Economy: ?
Predictions: ?
Remediation: ?Recommended: no mitigation known
0-Day Time: ?04/09/2019 CVE assigned
05/10/2019 Advisory disclosed
05/11/2019 VulDB entry created
05/11/2019 VulDB last updateCVE: CVE-2019-11066 (?)Created: 05/11/2019 02:58 AM
Complete: ?
Download the whitepaper to learn more about our service!
https://vuldb.com/?id.134575
Gloss