FKIE_CVE-2018-15904

Vulnerability from fkie_nvd - Published: 2018-08-27 15:29 - Updated: 2024-11-21 03:51
Severity ?
Summary
A10 ACOS Web Application Firewall (WAF) 2.7.1 and 2.7.2 before 2.7.2-P12, 4.1.0 before 4.1.0-P11, 4.1.1 before 4.1.1-P8, and 4.1.2 before 4.1.2-P4 mishandles the configured rules for blocking SQL injection attacks, aka A10-2017-0008.
Impacted products
Vendor Product Version
a10networks acos_web_application_firewall 2.7.1
a10networks acos_web_application_firewall 2.7.2
a10networks acos_web_application_firewall 2.7.2
a10networks acos_web_application_firewall 2.7.2
a10networks acos_web_application_firewall 2.7.2
a10networks acos_web_application_firewall 2.7.2
a10networks acos_web_application_firewall 2.7.2
a10networks acos_web_application_firewall 2.7.2
a10networks acos_web_application_firewall 2.7.2
a10networks acos_web_application_firewall 2.7.2
a10networks acos_web_application_firewall 2.7.2
a10networks acos_web_application_firewall 2.7.2
a10networks acos_web_application_firewall 2.7.2
a10networks acos_web_application_firewall 2.7.2
a10networks acos_web_application_firewall 4.1.0
a10networks acos_web_application_firewall 4.1.0
a10networks acos_web_application_firewall 4.1.0
a10networks acos_web_application_firewall 4.1.0
a10networks acos_web_application_firewall 4.1.0
a10networks acos_web_application_firewall 4.1.0
a10networks acos_web_application_firewall 4.1.0
a10networks acos_web_application_firewall 4.1.0
a10networks acos_web_application_firewall 4.1.0
a10networks acos_web_application_firewall 4.1.0
a10networks acos_web_application_firewall 4.1.0
a10networks acos_web_application_firewall 4.1.1
a10networks acos_web_application_firewall 4.1.1
a10networks acos_web_application_firewall 4.1.1
a10networks acos_web_application_firewall 4.1.1
a10networks acos_web_application_firewall 4.1.1
a10networks acos_web_application_firewall 4.1.1
a10networks acos_web_application_firewall 4.1.1
a10networks acos_web_application_firewall 4.1.1
a10networks acos_web_application_firewall 4.1.2
a10networks acos_web_application_firewall 4.1.2
a10networks acos_web_application_firewall 4.1.2
a10networks acos_web_application_firewall 4.1.2

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:2.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "311C85E2-1BA6-4708-BA94-CFCE44AF1E5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:2.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA5DB0C7-7F23-4DF2-A747-14C2E713F9A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:2.7.2:p1:*:*:*:*:*:*",
              "matchCriteriaId": "9E8DAFB0-1493-473C-BC9B-FEEBC7B1683C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:2.7.2:p10:*:*:*:*:*:*",
              "matchCriteriaId": "852C1DB3-010A-4076-A94F-E1F87ABFDE0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:2.7.2:p11:*:*:*:*:*:*",
              "matchCriteriaId": "05EC7C40-F9BE-4CA6-B430-52A33AE28B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:2.7.2:p2:*:*:*:*:*:*",
              "matchCriteriaId": "210F2FFE-D11F-4F25-8271-27200E5BDD94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:2.7.2:p3:*:*:*:*:*:*",
              "matchCriteriaId": "45526DF0-4D80-4748-B84E-217C1D20FF3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:2.7.2:p4:*:*:*:*:*:*",
              "matchCriteriaId": "060525E2-8631-4CB4-B840-DB78E135C1EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:2.7.2:p5:*:*:*:*:*:*",
              "matchCriteriaId": "A03DA6AE-7449-4697-9946-2D11D8BA05D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:2.7.2:p6:*:*:*:*:*:*",
              "matchCriteriaId": "25B6D2F4-9C33-4010-958C-ED164DBC0AC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:2.7.2:p7:*:*:*:*:*:*",
              "matchCriteriaId": "772FA589-A0FC-4005-9B2E-0B756A82989C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:2.7.2:p7-sp3:*:*:*:*:*:*",
              "matchCriteriaId": "CB95B803-E9A2-47C4-B632-39CD28F54D52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:2.7.2:p8:*:*:*:*:*:*",
              "matchCriteriaId": "62F2790A-4934-4DE9-A494-C12076F09E36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:2.7.2:p9:*:*:*:*:*:*",
              "matchCriteriaId": "2941313A-F9F1-4463-BAD2-A37EB0897AED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E88F42-1E39-4655-9615-2C20F04DA0BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:4.1.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "E10FD373-D90F-42CA-AA72-2418FA595E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:4.1.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "ECD5C321-AA40-4B93-9939-BADACE192B0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:4.1.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "778D63B9-4021-402E-B26C-31EE80050E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:4.1.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "0E43E84B-F19E-49F8-BE43-74A264410F77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:4.1.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "590BEB5A-3F13-45AE-8FD8-FDD59739875B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:4.1.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "7952E09C-6A23-4E8E-ADDB-78A7B5CA4BA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:4.1.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "19F51736-BAE8-402D-A95A-6502C837D22F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:4.1.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "EA362AFD-88AF-48E3-A295-CEA1843B569F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:4.1.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "B83CF9E2-A613-493B-B4BF-F20E9E049246",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:4.1.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "E73E65E6-2F44-4D9B-A7AB-F1923EC1D01F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A285DAE-EA0C-48BE-B732-B45A3E26B56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:4.1.1:p1:*:*:*:*:*:*",
              "matchCriteriaId": "D48E4E64-276E-4C37-8C71-F7791CEC3DBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:4.1.1:p2:*:*:*:*:*:*",
              "matchCriteriaId": "10698847-F287-4E76-8204-6C2097487938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:4.1.1:p3:*:*:*:*:*:*",
              "matchCriteriaId": "45DECA0A-331C-4E1C-AF37-C44505A80C38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:4.1.1:p4:*:*:*:*:*:*",
              "matchCriteriaId": "8811180D-F6F5-4B9E-8127-B3945AAC0965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:4.1.1:p5:*:*:*:*:*:*",
              "matchCriteriaId": "337D45DA-4604-4E28-9533-8050CEA9A7CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:4.1.1:p6:*:*:*:*:*:*",
              "matchCriteriaId": "16DFF56E-AB70-4209-99D4-7F3C63F3A61F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:4.1.1:p7:*:*:*:*:*:*",
              "matchCriteriaId": "0B393334-0401-42FD-BF25-CE2CE2E9DD04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D28C596B-BA8A-4724-BD7B-CD78E6C920E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:4.1.2:p1:*:*:*:*:*:*",
              "matchCriteriaId": "D7BED036-C3DF-40A3-A6AD-8128E03B52B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:4.1.2:p2:*:*:*:*:*:*",
              "matchCriteriaId": "000CD946-5C9B-4DD1-9B57-EEE5AE5937C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:a10networks:acos_web_application_firewall:4.1.2:p3:*:*:*:*:*:*",
              "matchCriteriaId": "A2468E85-1FCA-4631-9C51-17756CFE3143",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A10 ACOS Web Application Firewall (WAF) 2.7.1 and 2.7.2 before 2.7.2-P12, 4.1.0 before 4.1.0-P11, 4.1.1 before 4.1.1-P8, and 4.1.2 before 4.1.2-P4 mishandles the configured rules for blocking SQL injection attacks, aka A10-2017-0008."
    },
    {
      "lang": "es",
      "value": "A10 ACOS Web Application Firewall (WAF) 2.7.1 y 2.7.2 en versiones anteriores a la 2.7.2-P12, 4.1.0 en versiones anteriores a la 4.1.0-P11, 4.1.1 en versiones anteriores a la 4.1.1-P8 y 4.1.2 en versiones anteriores a la 4.1.2-P4 gestiona de manera incorrecta las reglas configuradas para bloquear ataques de inyecci\u00f3n SQL. Esto tambi\u00e9n se conoce como A10-2017-0008."
    }
  ],
  "id": "CVE-2018-15904",
  "lastModified": "2024-11-21T03:51:41.227",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-08-27T15:29:00.760",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.a10networks.com/support/security-advisories/waf-sql-injection-attack-sqlia-vulnerability"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.a10networks.com/support/security-advisories/waf-sql-injection-attack-sqlia-vulnerability"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…