CVE-2017-7686
Published Jun 28, 2017
Last updated 7 years ago
Overview
- Description
- Apache Ignite 1.0.0-RC3 to 2.0 uses an update notifier component to update the users about new project releases that include additional functionality, bug fixes and performance improvements. To do that the component communicates to an external PHP server (http://ignite.run) where it needs to send some system properties like Apache Ignite or Java version. Some of the properties might contain user sensitive information.
- Source
- security@apache.org
- NVD status
- Analyzed
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-200
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:ignite:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7DDBC991-F8E6-4843-B506-97F35FCB62F7" }, { "criteria": "cpe:2.3:a:apache:ignite:1.0.0:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE7DCCD6-7D9E-47EA-8B6E-3B83B5B06E68" }, { "criteria": "cpe:2.3:a:apache:ignite:1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D140870C-5B83-476F-86D2-3AD9D50307E5" }, { "criteria": "cpe:2.3:a:apache:ignite:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07715E5E-765D-4768-91C2-061BD12A74AD" }, { "criteria": "cpe:2.3:a:apache:ignite:1.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B2A35C7E-57F2-495C-ACA6-80C49CD38D58" }, { "criteria": "cpe:2.3:a:apache:ignite:1.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D9E8C9A-5869-49ED-9D7E-AC80F597D3C0" }, { "criteria": "cpe:2.3:a:apache:ignite:1.5.0:b1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C1A1BC9-235A-49F7-A25B-A5B74B954752" }, { "criteria": "cpe:2.3:a:apache:ignite:1.5.0:final:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC8C1EE6-43A8-46B0-9CCA-49F69986E91C" }, { "criteria": "cpe:2.3:a:apache:ignite:1.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4A116701-1224-448A-843F-684875AAE6B2" }, { "criteria": "cpe:2.3:a:apache:ignite:1.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EB2256D-DC30-4735-B172-D9F39432AFC9" }, { "criteria": "cpe:2.3:a:apache:ignite:1.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7EED4033-EE23-4123-86CA-BE3D2F3EF0EF" }, { "criteria": "cpe:2.3:a:apache:ignite:1.9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50CC6384-9F23-431C-BA93-A98856BE76B9" }, { "criteria": "cpe:2.3:a:apache:ignite:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF52AC79-8669-402C-AFFC-A2C555689DBD" } ], "operator": "OR" } ] } ]