CVE-2018-11787

Impact:
Moderate
Public Date:
2018-09-18
CWE:
CWE-592
Bugzilla:
1631100: CVE-2018-11787 karaf: Authentication bypass access to Gogo shell in the webconsole

The MITRE CVE dictionary describes this issue as:

In Apache Karaf version prior to 3.0.9, 4.0.9, 4.1.1, when the webconsole feature is installed in Karaf, it is available at .../system/console and requires authentication to access it. One part of the console is a Gogo shell/console that gives access to the command line console of Karaf via a Web browser, and when navigated to it is available at .../system/console/gogo. Trying to go directly to that URL does require authentication. And optional bundle that some applications use is the Pax Web Extender Whiteboard, it is part of the pax-war feature and perhaps others. When it is installed, the Gogo console becomes available at another URL .../gogo/, and that URL is not secured giving access to the Karaf console to unauthenticated users. A mitigation for the issue is to manually stop/uninstall Gogo plugin bundle that is installed with the webconsole feature, although of course this removes the console from the .../system/console application, not only from the unauthenticated endpoint. One could also stop/uninstall the Pax Web Extender Whiteboard, but other components/applications may require it and so their functionality would be reduced/compromised.

Find out more about CVE-2018-11787 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 7.5
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality None
Integrity Impact High
Availability Impact None

Affected Packages State

Platform Package State
Red Hat OpenStack Platform 9.0 opendaylight Under investigation
Red Hat OpenStack Platform 8.0 (Liberty) opendaylight Under investigation
Red Hat OpenStack Platform 13.0 (Queens) opendaylight Under investigation
Red Hat OpenStack Platform 12.0 opendaylight Under investigation
Red Hat OpenStack Platform 11.0 (Ocata) opendaylight Under investigation
Red Hat OpenStack Platform 10 opendaylight Under investigation
Red Hat JBoss Fuse Service Works 6 karaf Under investigation
Red Hat JBoss Fuse 7 karaf Under investigation
Red Hat JBoss Fuse 6 karaf Under investigation
Red Hat JBoss A-MQ 6 karaf Under investigation

External References

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.