ID

VAR-201509-0346


CVE

CVE-2015-5082


TITLE

Endian Firewall Vulnerable to arbitrary command execution

Trust: 0.8

sources: JVNDB: JVNDB-2015-004985

DESCRIPTION

Endian Firewall before 3.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) NEW_PASSWORD_1 or (2) NEW_PASSWORD_2 parameter to cgi-bin/chpasswd.cgi. Supplementary information : CWE Vulnerability type by CWE-77: Improper Neutralization of Special Elements used in a Command ( Command injection ) Has been identified. Versions prior to Endian Firewall 3.0 are vulnerable. Endian Firewall is a set of unified risk management tools based on the Red Hat Enterprise Linux operating system developed by Italian company Endian. The tool provides HTTP/FTP virus protection, POP3/SMTP virus protection, SSL/TLS virtual private network and other functions

Trust: 2.07

sources: NVD: CVE-2015-5082 // JVNDB: JVNDB-2015-004985 // BID: 76865 // VULHUB: VHN-83043 // VULMON: CVE-2015-5082

AFFECTED PRODUCTS

vendor:endian firewallmodel:endian firewallscope:lteversion:2.5.1

Trust: 1.0

vendor:endianmodel:firewallscope:ltversion:3.0

Trust: 0.8

vendor:endian firewallmodel:endian firewallscope:eqversion:2.5.1

Trust: 0.6

vendor:endianmodel:firewallscope:eqversion:2.5.1

Trust: 0.3

vendor:endianmodel:firewallscope:eqversion:2.1.2

Trust: 0.3

vendor:endianmodel:firewallscope:neversion:3.0

Trust: 0.3

sources: BID: 76865 // JVNDB: JVNDB-2015-004985 // CNNVD: CNNVD-201509-574 // NVD: CVE-2015-5082

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-5082
value: HIGH

Trust: 1.0

NVD: CVE-2015-5082
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201509-574
value: CRITICAL

Trust: 0.6

VULHUB: VHN-83043
value: HIGH

Trust: 0.1

VULMON: CVE-2015-5082
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-5082
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-83043
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-83043 // VULMON: CVE-2015-5082 // JVNDB: JVNDB-2015-004985 // CNNVD: CNNVD-201509-574 // NVD: CVE-2015-5082

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-83043 // JVNDB: JVNDB-2015-004985 // NVD: CVE-2015-5082

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201509-574

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201509-574

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-004985

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-83043 // VULMON: CVE-2015-5082

PATCH

title:Endian Firewall Communityurl:http://www.endian.com/community/download/

Trust: 0.8

sources: JVNDB: JVNDB-2015-004985

EXTERNAL IDS

db:NVDid:CVE-2015-5082

Trust: 2.9

db:PACKETSTORMid:133469

Trust: 2.6

db:EXPLOIT-DBid:38096

Trust: 1.8

db:EXPLOIT-DBid:37428

Trust: 1.8

db:EXPLOIT-DBid:37426

Trust: 1.8

db:JVNDBid:JVNDB-2015-004985

Trust: 0.8

db:CNNVDid:CNNVD-201509-574

Trust: 0.7

db:BIDid:76865

Trust: 0.4

db:VULHUBid:VHN-83043

Trust: 0.1

db:VULMONid:CVE-2015-5082

Trust: 0.1

sources: VULHUB: VHN-83043 // VULMON: CVE-2015-5082 // BID: 76865 // JVNDB: JVNDB-2015-004985 // CNNVD: CNNVD-201509-574 // NVD: CVE-2015-5082

REFERENCES

url:http://packetstormsecurity.com/files/133469/endian-firewall-proxy-password-change-command-injection.html

Trust: 2.6

url:https://www.exploit-db.com/exploits/38096/

Trust: 1.9

url:https://www.exploit-db.com/exploits/37426/

Trust: 1.8

url:https://www.exploit-db.com/exploits/37428/

Trust: 1.8

url:http://www.rapid7.com/db/modules/exploit/linux/http/efw_chpasswd_exec

Trust: 1.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5082

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-5082

Trust: 0.8

url:http://www.endian.com/en/products/firewall/appliances/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/77.html

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=41433

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-83043 // VULMON: CVE-2015-5082 // BID: 76865 // JVNDB: JVNDB-2015-004985 // CNNVD: CNNVD-201509-574 // NVD: CVE-2015-5082

CREDITS

Ben Lincoln

Trust: 0.3

sources: BID: 76865

SOURCES

db:VULHUBid:VHN-83043
db:VULMONid:CVE-2015-5082
db:BIDid:76865
db:JVNDBid:JVNDB-2015-004985
db:CNNVDid:CNNVD-201509-574
db:NVDid:CVE-2015-5082

LAST UPDATE DATE

2024-11-23T22:27:04.942000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-83043date:2016-12-08T00:00:00
db:VULMONid:CVE-2015-5082date:2016-12-08T00:00:00
db:BIDid:76865date:2015-09-29T00:00:00
db:JVNDBid:JVNDB-2015-004985date:2015-10-01T00:00:00
db:CNNVDid:CNNVD-201509-574date:2015-09-30T00:00:00
db:NVDid:CVE-2015-5082date:2024-11-21T02:32:18.203

SOURCES RELEASE DATE

db:VULHUBid:VHN-83043date:2015-09-28T00:00:00
db:VULMONid:CVE-2015-5082date:2015-09-28T00:00:00
db:BIDid:76865date:2015-09-29T00:00:00
db:JVNDBid:JVNDB-2015-004985date:2015-10-01T00:00:00
db:CNNVDid:CNNVD-201509-574date:2015-09-30T00:00:00
db:NVDid:CVE-2015-5082date:2015-09-28T15:59:00.097