CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
77.5%
The HTTPS fallback implementation in Shell In A Box (aka shellinabox) before 2.19 makes it easier for remote attackers to conduct DNS rebinding attacks via the “/plain” URL.
Vendor | Product | Version | CPE |
---|---|---|---|
fedoraproject | fedora | 22 | cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:* |
fedoraproject | fedora | 23 | cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:* |
shellinabox_project | shellinabox | * | cpe:2.3:a:shellinabox_project:shellinabox:*:*:*:*:*:*:*:* |
lists.fedoraproject.org/pipermail/package-announce/2016-January/175117.html
lists.fedoraproject.org/pipermail/package-announce/2016-January/175224.html
www.openwall.com/lists/oss-security/2015/12/02/6
www.openwall.com/lists/oss-security/2015/12/02/7
github.com/shellinabox/shellinabox/issues/355
github.com/shellinabox/shellinabox/releases/tag/v2.19
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
77.5%