CVE-2018-11787
CVSS V2 Medium 6.8
CVSS V3 High 8.1
Description
In Apache Karaf version prior to 3.0.9, 4.0.9, 4.1.1, when the webconsole feature is installed in Karaf, it is available at .../system/console and requires authentication to access it. One part of the console is a Gogo shell/console that gives access to the command line console of Karaf via a Web browser, and when navigated to it is available at .../system/console/gogo. Trying to go directly to that URL does require authentication. And optional bundle that some applications use is the Pax Web Extender Whiteboard, it is part of the pax-war feature and perhaps others. When it is installed, the Gogo console becomes available at another URL .../gogo/, and that URL is not secured giving access to the Karaf console to unauthenticated users. A mitigation for the issue is to manually stop/uninstall Gogo plugin bundle that is installed with the webconsole feature, although of course this removes the console from the .../system/console application, not only from the unauthenticated endpoint. One could also stop/uninstall the Pax Web Extender Whiteboard, but other components/applications may require it and so their functionality would be reduced/compromised.
Overview
- CVE ID
- CVE-2018-11787
- Assigner
- security@apache.org
- Vulnerability Status
- Analyzed
- Published Version
- 2018-09-18T14:29:00
- Last Modified Date
- 2018-12-06T14:35:04
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:apache:karaf:*:*:*:*:*:*:*:* | 1 | OR | 3.0.9 | |
cpe:2.3:a:apache:karaf:*:*:*:*:*:*:*:* | 1 | OR | 4.0.0 | 4.0.9 |
cpe:2.3:a:apache:karaf:*:*:*:*:*:*:*:* | 1 | OR | 4.1.0 | 4.1.1 |
cpe:2.3:a:apache:karaf:4.0.0:milestone1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:karaf:4.0.0:milestone2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:karaf:4.0.0:milestone3:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:N/C:P/I:P/A:P
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- NONE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- PARTIAL
- Availability Impact
- PARTIAL
- Base Score
- 6.8
- Severity
- MEDIUM
- Exploitability Score
- 8.6
- Impact Score
- 6.4
CVSS Version 3
- Version
- 3.0
- Vector String
- CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- NETWORK
- Attack Compatibility
- HIGH
- Privileges Required
- NONE
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- HIGH
- Base Score
- 8.1
- Base Severity
- HIGH
- Exploitability Score
- 2.2
- Impact Score
- 5.9
References
Reference URL | Reference Tags |
---|---|
https://lists.apache.org/thread.html/d9ba4c3104ba32225646879a057b75b54430f349c246c85469037d3c@%3Cdev.karaf.apache.org%3E | Issue Tracking Patch Vendor Advisory |
https://issues.apache.org/jira/browse/KARAF-4993 | Vendor Advisory |
http://karaf.apache.org/security/cve-2018-11787.txt | Patch Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2018-11787 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11787 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 17:50:41 | Added to TrackCVE | |||
2022-12-03 12:16:12 | 2018-09-18T14:29Z | 2018-09-18T14:29:00 | CVE Published Date | updated |
2022-12-03 12:16:12 | 2018-12-06T14:35:04 | CVE Modified Date | updated | |
2022-12-03 12:16:12 | Analyzed | Vulnerability Status | updated |