Published on July 7th, 2019 📆 | 5055 Views ⚑
0SWIFT Alliance Web Platform 7.1.23 Log PATH_INFO privilege escalation
https://www.ispeech.org/text.to.speech
CVSS Meta Temp Score | Current Exploit Price (β) |
---|---|
5.5 | $0-$5k |
A vulnerability classified as problematic was found in SWIFT Alliance Web Platform 7.1.23. This vulnerability affects an unknown functionality of the file swp/login/EJBRemoteService/ of the component Log Handler. The manipulation of the argument PATH_INFO
as part of a Error Message leads to a privilege escalation vulnerability (Injection). The CWE definition for the vulnerability is CWE-269. As an impact it is known to affect confidentiality, integrity, and availability.
The weakness was shared 07/05/2019. This vulnerability was named CVE-2018-16386 since 09/02/2018. There are known technical details, but no exploit is available. The current price for an exploit might be approx. USD $0-$5k (estimation calculated on 07/06/2019).
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Vendor
Name
VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.5
VulDB Base Score: β5.5
VulDB Temp Score: β5.5
VulDB Vector: π
VulDB Reliability: π
VulDB Base Score: π
VulDB Temp Score: π
VulDB Reliability: π
Class: Privilege escalation / Injection (CWE-269)
Local: Yes
Remote: No
Availability: π
Status: Not defined
Price Prediction: π
Current Price Estimation: π
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Threat: π
Adversaries: π
Geopolitics: π
Economy: π
Predictions: π
Remediation: πRecommended: no mitigation known
0-Day Time: π
09/02/2018 CVE assigned
07/05/2019 Advisory disclosed
07/06/2019 VulDB entry created
07/06/2019 VulDB last update
CVE: CVE-2018-16386 (π)Created: 07/06/2019 08:49 AM
Complete: π
See the underground prices here!
https://vuldb.com/?id.137404
Gloss