7.8
CVE-2019-5443
- EPSS 0.95%
- Published 02.07.2019 19:15:10
- Last modified 21.11.2024 04:44:56
- Source support@hackerone.com
- Teams watchlist Login
- Open Login
A non-privileged user or program can put code and a config file in a known non-privileged path (under C:/usr/local/) that will make curl <= 7.65.1 automatically run the code (as an openssl "engine") on invocation. If that curl is invoked by a privileged user it can do anything it wants.
Data is provided by the National Vulnerability Database (NVD)
Oracle ≫ Enterprise Manager Ops Center Version12.3.3
Oracle ≫ Enterprise Manager Ops Center Version12.4.0
Oracle ≫ HTTP Server Version12.2.1.3.0
Oracle ≫ HTTP Server Version12.2.1.4.0
Oracle ≫ Mysql Server Version >= 5.0.0 <= 5.7.27
Oracle ≫ Mysql Server Version >= 8.0.0 <= 8.0.17
Oracle ≫ Oss Support Tools Version20.0
Netapp ≫ Oncommand Insight Version-
Netapp ≫ Oncommand Unified Manager SwPlatformwindows Version >= 7.3
Netapp ≫ Oncommand Unified Manager SwPlatformvmware_vsphere Version >= 9.5
Netapp ≫ Oncommand Workflow Automation Version-
Netapp ≫ Snapcenter Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.95% | 0.756 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 4.4 | 3.4 | 6.4 |
AV:L/AC:M/Au:N/C:P/I:P/A:P
|
CWE-427 Uncontrolled Search Path Element
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.