5.8
CVSSv2

CVE-2007-4174

Published: 07/08/2007 Updated: 29/07/2017
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
VMScore: 590
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

Tor prior to 0.1.2.16, when ControlPort is enabled, does not properly restrict commands to localhost port 9051, which allows remote malicious users to modify the torrc configuration file, compromise anonymity, and have other unspecified impact via HTTP POST data containing commands without valid authentication, as demonstrated by an HTML form (1) hosted on a web site or (2) injected by a Tor exit node.

Vulnerable Product Search on Vulmon Subscribe to Product

tor tor

tor tor 0.1.2.8

tor tor 0.1.2.7

tor tor 0.1.2.10

tor tor 0.1.2.9

tor tor 0.1.2.1

tor tor 0.1.2.2

tor tor 0.1.2.14

tor tor 0.1.2.13

tor tor 0.1.2.6

tor tor 0.1.2.5

tor tor 0.1.2.12

tor tor 0.1.2.11

tor tor 0.1.2.4

tor tor 0.1.2.3

Exploits

source: wwwsecurityfocuscom/bid/25188/info Tor is prone to an unauthorized-access vulnerability due to a design error when handling multiple connections to the ControlPort An attacker can exploit this issue to reconfigure Tor and significantly weaken the anonymity provided by the software Tor 01215 is confirmed vulnerable; previous ...
<!-- Tor < 01216 with ControlPort enabled ( not default ) Exploit for Tor ControlPort "torrc" Rewrite Vulnerability secuniacom/advisories/26301 Rewrites the torrc to log to a different location: C:\Documents and Settings\All Users\Start Menu\Programs\Startup\tbat Also enables debug logging, and an erroneous ExitPolicy looking s ...