CVE-2018-11787

CVSS V2 Medium 6.8 CVSS V3 High 8.1
Description
In Apache Karaf version prior to 3.0.9, 4.0.9, 4.1.1, when the webconsole feature is installed in Karaf, it is available at .../system/console and requires authentication to access it. One part of the console is a Gogo shell/console that gives access to the command line console of Karaf via a Web browser, and when navigated to it is available at .../system/console/gogo. Trying to go directly to that URL does require authentication. And optional bundle that some applications use is the Pax Web Extender Whiteboard, it is part of the pax-war feature and perhaps others. When it is installed, the Gogo console becomes available at another URL .../gogo/, and that URL is not secured giving access to the Karaf console to unauthenticated users. A mitigation for the issue is to manually stop/uninstall Gogo plugin bundle that is installed with the webconsole feature, although of course this removes the console from the .../system/console application, not only from the unauthenticated endpoint. One could also stop/uninstall the Pax Web Extender Whiteboard, but other components/applications may require it and so their functionality would be reduced/compromised.
Overview
  • CVE ID
  • CVE-2018-11787
  • Assigner
  • security@apache.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2018-09-18T14:29:00
  • Last Modified Date
  • 2018-12-06T14:35:04
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:apache:karaf:*:*:*:*:*:*:*:* 1 OR 3.0.9
cpe:2.3:a:apache:karaf:*:*:*:*:*:*:*:* 1 OR 4.0.0 4.0.9
cpe:2.3:a:apache:karaf:*:*:*:*:*:*:*:* 1 OR 4.1.0 4.1.1
cpe:2.3:a:apache:karaf:4.0.0:milestone1:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:karaf:4.0.0:milestone2:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:karaf:4.0.0:milestone3:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 6.8
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 6.4
CVSS Version 3
  • Version
  • 3.0
  • Vector String
  • CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • HIGH
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 8.1
  • Base Severity
  • HIGH
  • Exploitability Score
  • 2.2
  • Impact Score
  • 5.9
History
Created Old Value New Value Data Type Notes
2022-05-10 17:50:41 Added to TrackCVE
2022-12-03 12:16:12 2018-09-18T14:29Z 2018-09-18T14:29:00 CVE Published Date updated
2022-12-03 12:16:12 2018-12-06T14:35:04 CVE Modified Date updated
2022-12-03 12:16:12 Analyzed Vulnerability Status updated