Lucene search

K
cve[email protected]CVE-2017-12112
HistoryJan 19, 2018 - 10:29 p.m.

CVE-2017-12112

2018-01-1922:29:00
CWE-863
web.nvd.nist.gov
43
cve
2017
12112
improper authorization
admin_addpeer api
json-rpc
cpp-ethereum
nvd

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

High

0.013 Low

EPSS

Percentile

85.8%

An exploitable improper authorization vulnerability exists in admin_addPeer API of cpp-ethereum’s JSON-RPC (commit 4e1015743b95821849d001618a7ce82c7c073768). A JSON request can cause an access to the restricted functionality resulting in authorization bypass. An attacker can send JSON to trigger this vulnerability.

Affected configurations

Vulners
NVD
Node
taloscpp-ethereumRangeEthereum commit 4e1015743b95821849d001618a7ce82c7c073768

CNA Affected

[
  {
    "product": "CPP-Ethereum",
    "vendor": "Talos",
    "versions": [
      {
        "status": "affected",
        "version": "Ethereum commit 4e1015743b95821849d001618a7ce82c7c073768"
      }
    ]
  }
]

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

High

0.013 Low

EPSS

Percentile

85.8%