All the vulnerabilites related to supervisord - supervisor
cve-2019-12105
Vulnerability from cvelistv5
Published
2019-09-10 16:18
Modified
2024-08-04 23:10
Severity ?
EPSS score ?
Summary
In Supervisor through 4.0.2, an unauthenticated user can read log files or restart a service. Note: The maintainer responded that the affected component, inet_http_server, is not enabled by default but if the user enables it and does not set a password, Supervisor logs a warning message. The maintainer indicated the ability to run an open server will not be removed but an additional warning was added to the documentation
References
▼ | URL | Tags |
---|---|---|
https://github.com/Supervisor/supervisor/commit/4e334d9cf2a1daff685893e35e72398437df3dcb | x_refsource_MISC | |
https://github.com/Supervisor/supervisor/issues/1245 | x_refsource_MISC | |
http://supervisord.org/configuration.html#inet-http-server-section-settings | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2019-12105", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-11T18:36:35.707915Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-11T18:36:42.541Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-04T23:10:30.578Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Supervisor/supervisor/commit/4e334d9cf2a1daff685893e35e72398437df3dcb" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Supervisor/supervisor/issues/1245" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://supervisord.org/configuration.html#inet-http-server-section-settings" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Supervisor through 4.0.2, an unauthenticated user can read log files or restart a service. Note: The maintainer responded that the affected component, inet_http_server, is not enabled by default but if the user enables it and does not set a password, Supervisor logs a warning message. The maintainer indicated the ability to run an open server will not be removed but an additional warning was added to the documentation" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-17T21:53:52", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Supervisor/supervisor/commit/4e334d9cf2a1daff685893e35e72398437df3dcb" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Supervisor/supervisor/issues/1245" }, { "tags": [ "x_refsource_MISC" ], "url": "http://supervisord.org/configuration.html#inet-http-server-section-settings" } ], "tags": [ "disputed" ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-12105", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** DISPUTED ** In Supervisor through 4.0.2, an unauthenticated user can read log files or restart a service. Note: The maintainer responded that the affected component, inet_http_server, is not enabled by default but if the user enables it and does not set a password, Supervisor logs a warning message. The maintainer indicated the ability to run an open server will not be removed but an additional warning was added to the documentation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Supervisor/supervisor/commit/4e334d9cf2a1daff685893e35e72398437df3dcb", "refsource": "MISC", "url": "https://github.com/Supervisor/supervisor/commit/4e334d9cf2a1daff685893e35e72398437df3dcb" }, { "name": "https://github.com/Supervisor/supervisor/issues/1245", "refsource": "MISC", "url": "https://github.com/Supervisor/supervisor/issues/1245" }, { "name": "http://supervisord.org/configuration.html#inet-http-server-section-settings", "refsource": "MISC", "url": "http://supervisord.org/configuration.html#inet-http-server-section-settings" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-12105", "datePublished": "2019-09-10T16:18:27", "dateReserved": "2019-05-15T00:00:00", "dateUpdated": "2024-08-04T23:10:30.578Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-11610
Vulnerability from cvelistv5
Published
2017-08-23 14:00
Modified
2024-08-05 18:12
Severity ?
EPSS score ?
Summary
The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:12:40.456Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2017:3005", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:3005" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt" }, { "name": "FEDORA-2017-307eab89e1", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4GMSCGMM477N64Z3BM34RWYBGSLK466B/" }, { "name": "FEDORA-2017-85eb9f7a36", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DTPDZV4ZRICDYAYZVUHSYZAYDLRMG2IM/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt" }, { "name": "FEDORA-2017-713430fb15", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXGWOJNSWWK2TTWQJZJUP66FLFIWDMBQ/" }, { "name": "DSA-3942", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2017/dsa-3942" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Supervisor/supervisor/issues/964" }, { "name": "42779", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/42779/" }, { "name": "GLSA-201709-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201709-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-07-24T00:00:00", "descriptions": [ { "lang": "en", "value": "The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-01T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2017:3005", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:3005" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt" }, { "name": "FEDORA-2017-307eab89e1", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4GMSCGMM477N64Z3BM34RWYBGSLK466B/" }, { "name": "FEDORA-2017-85eb9f7a36", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DTPDZV4ZRICDYAYZVUHSYZAYDLRMG2IM/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt" }, { "name": "FEDORA-2017-713430fb15", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXGWOJNSWWK2TTWQJZJUP66FLFIWDMBQ/" }, { "name": "DSA-3942", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2017/dsa-3942" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Supervisor/supervisor/issues/964" }, { "name": "42779", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/42779/" }, { "name": "GLSA-201709-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201709-06" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-11610", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2017:3005", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:3005" }, { "name": "https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt", "refsource": "CONFIRM", "url": "https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt" }, { "name": "https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt", "refsource": "CONFIRM", "url": "https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt" }, { "name": "https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt", "refsource": "CONFIRM", "url": "https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt" }, { "name": "FEDORA-2017-307eab89e1", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GMSCGMM477N64Z3BM34RWYBGSLK466B/" }, { "name": "FEDORA-2017-85eb9f7a36", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DTPDZV4ZRICDYAYZVUHSYZAYDLRMG2IM/" }, { "name": "https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt", "refsource": "CONFIRM", "url": "https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt" }, { "name": "FEDORA-2017-713430fb15", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXGWOJNSWWK2TTWQJZJUP66FLFIWDMBQ/" }, { "name": "DSA-3942", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3942" }, { "name": "https://github.com/Supervisor/supervisor/issues/964", "refsource": "CONFIRM", "url": "https://github.com/Supervisor/supervisor/issues/964" }, { "name": "42779", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/42779/" }, { "name": "GLSA-201709-06", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201709-06" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-11610", "datePublished": "2017-08-23T14:00:00", "dateReserved": "2017-07-24T00:00:00", "dateUpdated": "2024-08-05T18:12:40.456Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2017-08-23 14:29
Modified
2024-11-21 03:08
Severity ?
Summary
The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
supervisord | supervisor | * | |
supervisord | supervisor | 3.1.0 | |
supervisord | supervisor | 3.1.1 | |
supervisord | supervisor | 3.1.2 | |
supervisord | supervisor | 3.1.3 | |
supervisord | supervisor | 3.2.0 | |
supervisord | supervisor | 3.2.1 | |
supervisord | supervisor | 3.2.2 | |
supervisord | supervisor | 3.2.3 | |
supervisord | supervisor | 3.3.0 | |
supervisord | supervisor | 3.3.1 | |
supervisord | supervisor | 3.3.2 | |
fedoraproject | fedora | 24 | |
fedoraproject | fedora | 25 | |
fedoraproject | fedora | 26 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
redhat | cloudforms | 4.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:supervisord:supervisor:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF8843B0-023D-4D38-B8A6-0082DA076EB0", "versionEndIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:supervisord:supervisor:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F7331EA-43A4-4B66-A2C8-9F9677CDF199", "vulnerable": true }, { "criteria": "cpe:2.3:a:supervisord:supervisor:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "873339F6-2F2F-4FCA-850B-AFBB869FAE49", "vulnerable": true }, { "criteria": "cpe:2.3:a:supervisord:supervisor:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "EB8C540A-EFA9-41E3-B80A-B5D1DC002BF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:supervisord:supervisor:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "3F9FCD82-05D1-4AE0-B5F4-83C70D34B3C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:supervisord:supervisor:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "EEBADED9-ABB4-4D28-916E-71A005781756", "vulnerable": true }, { "criteria": "cpe:2.3:a:supervisord:supervisor:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "58A70602-4024-4EB4-BC9D-9AA65E3DC3FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:supervisord:supervisor:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "164F8D14-DC0E-4F60-B3E9-E4BB7BC859DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:supervisord:supervisor:3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "FACD9C65-805C-42B8-970F-71086029EC3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:supervisord:supervisor:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "73D1DFCA-8289-41C7-A11A-5B5BFA6BA493", "vulnerable": true }, { "criteria": "cpe:2.3:a:supervisord:supervisor:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "A9C1E9BA-5D9E-407F-80DE-E3C7886F8FD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:supervisord:supervisor:3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "4642C276-6F33-4FC8-80FB-512310366D30", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "matchCriteriaId": "C729D5D1-ED95-443A-9F53-5D7C2FD9B80C", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*", "matchCriteriaId": "772E9557-A371-4664-AE2D-4135AAEB89AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*", "matchCriteriaId": "6E4D8269-B407-4C24-AAB0-02F885C7D752", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:cloudforms:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "32E1BA91-4695-4E64-A9D7-4A6CB6904D41", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups." }, { "lang": "es", "value": "El servidor XML-RPC en supervisor en versiones anteriores a la 3.0.1, 3.1.x en versiones anteriores a la 3.1.4, 3.2.x en versiones anteriores a la 3.2.4, y 3.3.x en versiones anteriores a la 3.3.3 permite que atacantes remotos autenticados ejecuten comandos arbitrarios mediante una petici\u00f3n XML-RPC, relacionada con b\u00fasquedas de espacio de nombres supervisor anidados." } ], "id": "CVE-2017-11610", "lastModified": "2024-11-21T03:08:06.960", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-08-23T14:29:00.237", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-3942" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:3005" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/Supervisor/supervisor/issues/964" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4GMSCGMM477N64Z3BM34RWYBGSLK466B/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DTPDZV4ZRICDYAYZVUHSYZAYDLRMG2IM/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXGWOJNSWWK2TTWQJZJUP66FLFIWDMBQ/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201709-06" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/42779/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-3942" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:3005" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/Supervisor/supervisor/issues/964" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4GMSCGMM477N64Z3BM34RWYBGSLK466B/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DTPDZV4ZRICDYAYZVUHSYZAYDLRMG2IM/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXGWOJNSWWK2TTWQJZJUP66FLFIWDMBQ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201709-06" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/42779/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-09-10 17:15
Modified
2024-11-21 04:22
Severity ?
Summary
In Supervisor through 4.0.2, an unauthenticated user can read log files or restart a service. Note: The maintainer responded that the affected component, inet_http_server, is not enabled by default but if the user enables it and does not set a password, Supervisor logs a warning message. The maintainer indicated the ability to run an open server will not be removed but an additional warning was added to the documentation
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
supervisord | supervisor | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:supervisord:supervisor:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BB007CD-542E-4152-82F7-0E2236F48BCA", "versionEndIncluding": "4.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [ { "sourceIdentifier": "cve@mitre.org", "tags": [ "disputed" ] } ], "descriptions": [ { "lang": "en", "value": "In Supervisor through 4.0.2, an unauthenticated user can read log files or restart a service. Note: The maintainer responded that the affected component, inet_http_server, is not enabled by default but if the user enables it and does not set a password, Supervisor logs a warning message. The maintainer indicated the ability to run an open server will not be removed but an additional warning was added to the documentation" }, { "lang": "es", "value": "** EN DISPUTA ** En Supervisor hasta la versi\u00f3n 4.0.2, un usuario no autenticado puede leer archivos de registro o reiniciar un servicio. Nota: El responsable de mantenimiento respondi\u00f3 que el componente afectado, inet_http_server, no est\u00e1 habilitado de manera predeterminada, pero si el usuario lo habilita y no establece una contrase\u00f1a, Supervisor registra un mensaje de advertencia. El responsable de mantenimiento indic\u00f3 que la capacidad de ejecutar un servidor abierto no se eliminar\u00e1, pero se agreg\u00f3 una advertencia adicional a la documentaci\u00f3n." } ], "id": "CVE-2019-12105", "lastModified": "2024-11-21T04:22:12.587", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-09-10T17:15:11.517", "references": [ { "source": "cve@mitre.org", "url": "http://supervisord.org/configuration.html#inet-http-server-section-settings" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Supervisor/supervisor/commit/4e334d9cf2a1daff685893e35e72398437df3dcb" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Supervisor/supervisor/issues/1245" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://supervisord.org/configuration.html#inet-http-server-section-settings" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Supervisor/supervisor/commit/4e334d9cf2a1daff685893e35e72398437df3dcb" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Supervisor/supervisor/issues/1245" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }