FKIE_CVE-2016-9885

Vulnerability from fkie_nvd - Published: 2017-01-06 22:59 - Updated: 2026-05-06 22:30
Severity ?
Summary
An issue was discovered in Pivotal GemFire for PCF 1.6.x versions prior to 1.6.5 and 1.7.x versions prior to 1.7.1. The gfsh (Geode Shell) endpoint, used by operators and application developers to connect to their cluster, is unauthenticated and publicly accessible. Because HTTPS communications are terminated at the gorouter, communications from the gorouter to GemFire clusters are unencrypted. An attacker could run any command available on gfsh and could cause denial of service, lost confidentiality of data, escalate privileges, or eavesdrop on other communications between the gorouter and the cluster.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:pivotal_software:gemfire_for_pivotal_cloud_foundry:1.6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD909621-396B-4DBA-9BBF-E7624F021DD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pivotal_software:gemfire_for_pivotal_cloud_foundry:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF873DE7-FB88-4843-A30C-D19DE457AA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pivotal_software:gemfire_for_pivotal_cloud_foundry:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E53629D-345C-4F47-9B3C-7E06C92F41A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pivotal_software:gemfire_for_pivotal_cloud_foundry:1.6.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6830AC00-0645-47E1-A6C8-4CDFFB3FEDFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pivotal_software:gemfire_for_pivotal_cloud_foundry:1.6.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8EEFAC4-E1E7-4B64-8C52-0596F130E8F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pivotal_software:gemfire_for_pivotal_cloud_foundry:1.7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "94B36355-047D-410F-9B41-927CCD95B2C9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in Pivotal GemFire for PCF 1.6.x versions prior to 1.6.5 and 1.7.x versions prior to 1.7.1. The gfsh (Geode Shell) endpoint, used by operators and application developers to connect to their cluster, is unauthenticated and publicly accessible. Because HTTPS communications are terminated at the gorouter, communications from the gorouter to GemFire clusters are unencrypted. An attacker could run any command available on gfsh and could cause denial of service, lost confidentiality of data, escalate privileges, or eavesdrop on other communications between the gorouter and the cluster."
    },
    {
      "lang": "es",
      "value": "Se descubri\u00f3 un problema en Pivotal GemFire para PCF 1.6.x versiones previas a 1.6.5 y 1.7.x versiones previas a 1.7.1. El punto final gfsh (Geode Shell), utilizado por operadores y desarrolladores de aplicaciones para conectar a su cluster, no est\u00e1 autenticado y es p\u00fablicamente accesible. Debido a que las comunicaciones HTTPS terminan en el gorouter, las comunicaciones desde el gorouter a los clusters GemFire no est\u00e1n cifradas. Un atacante podr\u00eda ejecutar cualquier comando disponible en gfsh y podr\u00eda provocar denegaci\u00f3n de servicio, p\u00e9rdida de la confidencialidad de los datos, escalar privilegios o escuchar otras comunicaciones entre el gorouter y el cluster."
    }
  ],
  "id": "CVE-2016-9885",
  "lastModified": "2026-05-06T22:30:45.220",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-01-06T22:59:00.390",
  "references": [
    {
      "source": "security_alert@emc.com",
      "url": "http://www.securityfocus.com/bid/95270"
    },
    {
      "source": "security_alert@emc.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://pivotal.io/security/cve-2016-9885"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/95270"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://pivotal.io/security/cve-2016-9885"
    }
  ],
  "sourceIdentifier": "security_alert@emc.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        },
        {
          "lang": "en",
          "value": "CWE-254"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…