- Description
- The Piranha Configuration Tool in Piranha 0.8.6 does not properly restrict access to webpages, which allows remote attackers to bypass authentication and read or modify the LVS configuration via an HTTP POST request.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
CVSS 2.0
- Type
- Primary
- Base score
- 5.8
- Impact score
- 6.4
- Exploitability score
- 6.5
- Vector string
- AV:A/AC:L/Au:N/C:P/I:P/A:P
- nvd@nist.gov
- CWE-264
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ryan_ohara:piranha:0.8.6:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "32200CEC-F9DB-4856-BBF7-9F43F811E2C7"
}
],
"operator": "OR"
}
]
}
]