Lucene search

K
nvd[email protected]NVD:CVE-2018-1316
HistoryMar 05, 2018 - 2:29 p.m.

CVE-2018-1316

2018-03-0514:29:00
CWE-22
web.nvd.nist.gov

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

7.3 High

AI Score

Confidence

High

0.019 Low

EPSS

Percentile

88.5%

The ODE process deployment web service was sensible to deployment messages with forged names. Using a path for the name was allowing directory traversal, resulting in the potential writing of files under unwanted locations, the overwriting of existing files or their deletion. This issue was addressed in Apache ODE 1.3.3 which was released in 2009, however the incorrect name CVE-2008-2370 was used on the advisory by mistake.

Affected configurations

NVD
Node
apacheodeRange1.1.11.3.2
OR
apacheodeMatch1.0incubating
OR
apacheodeMatch1.0rc1-incubating
OR
apacheodeMatch1.0rc2-incubating
OR
apacheodeMatch1.0rc3-incubating
OR
apacheodeMatch1.0rc4-incubating
OR
apacheodeMatch1.1rc1
OR
apacheodeMatch1.1rc2
OR
apacheodeMatch1.1rc3
OR
apacheodeMatch1.1rc4
OR
apacheodeMatch1.1rc5
OR
apacheodeMatch1.1.1rc1

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

7.3 High

AI Score

Confidence

High

0.019 Low

EPSS

Percentile

88.5%