Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:45404
HistoryFeb 08, 2024 - 6:45 a.m.

Arbitrary Code Execution

2024-02-0806:45:02
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
14
graylog
arbitrary code execution
class validation
http put request
exploitation

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.6%

Graylog is vulnerable to Arbitrary Code Execution. The vulnerability is due to a lack of class validation, which allows an attacker to send a HTTP PUT request to the /api/system/cluster_config/ endpoint which results in the loading of arbitrary classes. This issue can be exploited by an attacker by execute arbitrary code.

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.6%

Related for VERACODE:45404