ID

VAR-201901-0700


CVE

CVE-2018-17431


TITLE

Comodo UTM Firewall Authentication vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-014209

DESCRIPTION

Web Console in Comodo UTM Firewall before 2.7.0 allows remote attackers to execute arbitrary code without authentication via a crafted URL. Comodo UTM Firewall Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Comodo UTM Firewall is a UTM firewall developed by American Comodo Group. The product includes features such as antispam, content filtering, Web filtering and antivirus. Web Console is one of the web-based management console programs

Trust: 1.8

sources: NVD: CVE-2018-17431 // JVNDB: JVNDB-2018-014209 // VULHUB: VHN-127890 // VULMON: CVE-2018-17431

AFFECTED PRODUCTS

vendor:comodomodel:unified threat management firewallscope:ltversion:2.7.0

Trust: 1.0

vendor:comodomodel:utm firewallscope:ltversion:2.7.0

Trust: 0.8

sources: JVNDB: JVNDB-2018-014209 // NVD: CVE-2018-17431

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-17431
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-17431
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201901-1012
value: CRITICAL

Trust: 0.6

VULHUB: VHN-127890
value: HIGH

Trust: 0.1

VULMON: CVE-2018-17431
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-17431
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-127890
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-17431
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2018-17431
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-127890 // VULMON: CVE-2018-17431 // JVNDB: JVNDB-2018-014209 // CNNVD: CNNVD-201901-1012 // NVD: CVE-2018-17431

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

sources: VULHUB: VHN-127890 // JVNDB: JVNDB-2018-014209 // NVD: CVE-2018-17431

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201901-1012

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201901-1012

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-014209

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-127890

PATCH

title:UTM Firewallurl:https://cdome.comodo.com/firewall/

Trust: 0.8

title:Comodo UTM Firewall Web Console Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=89043

Trust: 0.6

title:CVE-2018-17431-PoCurl:https://github.com/Fadavvi/CVE-2018-17431-PoC

Trust: 0.1

title:nuclei-templatesurl:https://github.com/storenth/nuclei-templates

Trust: 0.1

title: - url:https://github.com/merlinepedra25/nuclei-templates

Trust: 0.1

title: - url:https://github.com/merlinepedra/nuclei-templates

Trust: 0.1

title:kenzer-templatesurl:https://github.com/ARPSyndicate/kenzer-templates

Trust: 0.1

title:kenzer-templatesurl:https://github.com/Elsfa7-110/kenzer-templates

Trust: 0.1

title: - url:https://github.com/khulnasoft-lab/awesome-security

Trust: 0.1

title:CVE-POCurl:https://github.com/0xT11/CVE-POC

Trust: 0.1

title:PoC-in-GitHuburl:https://github.com/nomi-sec/PoC-in-GitHub

Trust: 0.1

sources: VULMON: CVE-2018-17431 // JVNDB: JVNDB-2018-014209 // CNNVD: CNNVD-201901-1012

EXTERNAL IDS

db:NVDid:CVE-2018-17431

Trust: 2.6

db:PACKETSTORMid:159246

Trust: 1.8

db:JVNDBid:JVNDB-2018-014209

Trust: 0.8

db:EXPLOIT-DBid:48825

Trust: 0.7

db:CNNVDid:CNNVD-201901-1012

Trust: 0.7

db:VULHUBid:VHN-127890

Trust: 0.1

db:VULMONid:CVE-2018-17431

Trust: 0.1

sources: VULHUB: VHN-127890 // VULMON: CVE-2018-17431 // JVNDB: JVNDB-2018-014209 // CNNVD: CNNVD-201901-1012 // NVD: CVE-2018-17431

REFERENCES

url:https://github.com/fadavvi/cve-2018-17431-poc#confirmation-than-bug-exist-2018-09-25-ticket-id-xwr-503-79437

Trust: 2.6

url:http://packetstormsecurity.com/files/159246/comodo-unified-threat-management-web-console-2.7.0-remote-code-execution.html

Trust: 1.8

url:https://drive.google.com/file/d/0bzfjhnqnhcotbndsumnjvwngywnjawxycwnys2zdajlutdfz/view

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-17431

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-17431

Trust: 0.8

url:https://www.exploit-db.com/exploits/48825

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/287.html

Trust: 0.1

url:https://github.com/fadavvi/cve-2018-17431-poc

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-127890 // VULMON: CVE-2018-17431 // JVNDB: JVNDB-2018-014209 // CNNVD: CNNVD-201901-1012 // NVD: CVE-2018-17431

CREDITS

Milad Fadavvi

Trust: 0.6

sources: CNNVD: CNNVD-201901-1012

SOURCES

db:VULHUBid:VHN-127890
db:VULMONid:CVE-2018-17431
db:JVNDBid:JVNDB-2018-014209
db:CNNVDid:CNNVD-201901-1012
db:NVDid:CVE-2018-17431

LAST UPDATE DATE

2024-11-23T22:37:56.117000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-127890date:2023-01-20T00:00:00
db:VULMONid:CVE-2018-17431date:2023-01-20T00:00:00
db:JVNDBid:JVNDB-2018-014209date:2019-03-14T00:00:00
db:CNNVDid:CNNVD-201901-1012date:2020-10-22T00:00:00
db:NVDid:CVE-2018-17431date:2024-11-21T03:54:23.820

SOURCES RELEASE DATE

db:VULHUBid:VHN-127890date:2019-01-30T00:00:00
db:VULMONid:CVE-2018-17431date:2019-01-30T00:00:00
db:JVNDBid:JVNDB-2018-014209date:2019-03-14T00:00:00
db:CNNVDid:CNNVD-201901-1012date:2019-01-31T00:00:00
db:NVDid:CVE-2018-17431date:2019-01-30T15:29:04.490