Mimosa Client および Backhaul におけるインジェクションに関する脆弱性
| Title |
Mimosa Client および Backhaul におけるインジェクションに関する脆弱性
|
| Summary |
Mimosa Client および Backhaul には、インジェクションに関する脆弱性が存在します。
|
| Possible impacts |
情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution |
ベンダ情報および参考情報を参照して適切な対策を実施してください。 |
| Publication Date |
May 12, 2017, midnight |
| Registration Date |
June 19, 2017, 5:29 p.m. |
| Last Update |
June 19, 2017, 5:29 p.m. |
|
CVSS3.0 : 重要
|
| Score |
8.8
|
| Vector |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
CVSS2.0 : 危険
|
| Score |
9
|
| Vector |
AV:N/AC:L/Au:S/C:C/I:C/A:C |
Affected System
| Mimosa Networks, Inc. |
|
Mimosa Backhaul 2.2.4 未満
|
|
Mimosa Client 2.2.4 未満
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
| No |
Changed Details |
Date of change |
| 0 |
[2017年06月19日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
NVD Vulnerability Information
CVE-2017-9135
| Summary |
An issue was discovered on Mimosa Client Radios before 2.2.4 and Mimosa Backhaul Radios before 2.2.4. On the backend of the device's web interface, there are some diagnostic tests available that are not displayed on the webpage; these are only accessible by crafting a POST request with a program like cURL. There is one test accessible via cURL that does not properly sanitize user input, allowing an attacker to execute shell commands as the root user.
|
| Publication Date |
May 22, 2017, 6:29 a.m. |
| Registration Date |
Jan. 26, 2021, 1:30 p.m. |
| Last Update |
Nov. 21, 2024, 12:35 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:mimosa:client_radios:*:*:*:*:*:*:*:* |
|
2.2.3 |
|
|
| cpe:2.3:o:mimosa:backhaul_radios:*:*:*:*:*:*:*:* |
|
2.2.3 |
|
|
Related information, measures and tools
Common Vulnerabilities List