Vulnerability CVE-2011-0018


Published: 2011-01-28   Modified: 2012-02-13

Description:
The email function in manage_sql.c in OpenVAS Manager 1.0.x through 1.0.3 and 2.0.x through 2.0rc2 allows remote authenticated users to execute arbitrary commands via the (1) To or (2) From e-mail address in an OMP request to the Greenbone Security Assistant (GSA).

See advisories in our WLB2 database:
Topic
Author
Date
High
OpenVAS Manager Vulnerable To Command Injection
Tim Brown
31.01.2011
High
OpenVAS Manager Command Injection Vulnerability
Tim Brown
01.02.2011

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:S/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
9/10
10/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Openvas -> Openvas manager 

 References:
http://www.exploit-db.com/exploits/16086
http://www.openvas.org/OVSA20110118.html
http://www.securityfocus.com/archive/1/515971/100/0/threaded
http://www.securityfocus.com/bid/45987
http://www.vupen.com/english/advisories/2011/0208
https://exchange.xforce.ibmcloud.com/vulnerabilities/65011

Copyright 2024, cxsecurity.com

 

Back to Top