10
CVSSv2

CVE-2014-3804

Published: 13/06/2014 Updated: 16/09/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The av-centerd SOAP service in AlienVault OSSIM prior to 4.7.0 allows remote malicious users to execute arbitrary commands via a crafted (1) update_system_info_debian_package, (2) ossec_task, (3) set_ossim_setup admin_ip, (4) sync_rserver, or (5) set_ossim_setup framework_ip request, a different vulnerability than CVE-2014-3805.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

alienvault open source security information management 4.6

alienvault open source security information management 4.5

alienvault open source security information management 4.4

alienvault open source security information management 4.2

alienvault open source security information management 4.2.2

alienvault open source security information management 4.0.4

alienvault open source security information management 4.1

alienvault open source security information management 4.3.1

alienvault open source security information management 4.3.2

alienvault open source security information management 4.0

alienvault open source security information management

alienvault open source security information management 4.1.2

alienvault open source security information management 4.1.3

alienvault open source security information management 4.3.3

alienvault open source security information management 4.0.3

alienvault open source security information management 4.2.3

alienvault open source security information management 4.3

Exploits

## # This module requires Metasploit: http//metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' require 'rexml/document' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include REXML def initialize(info = {}) super ...
require 'msf/core' class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::HttpClient def initialize super( 'Name' => 'Alienvault OSSIM av-centerd Utilpm sync_rserver Command Execution', 'Description' => %q{ This module exploits a command injection vulnerability found within the sync_rserver funct ...