7.8
CVSSv3

CVE-2017-14105

Published: 01/09/2017 Updated: 13/09/2017
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

HiveManager Classic up to and including 8.1r1 allows arbitrary JSP code execution by modifying a backup archive before a restore, because the restore feature does not validate pathnames within the archive. An authenticated, local attacker - even restricted as a tenant - can add a jsp at HiveManager/tomcat/webapps/hm/domains/$yourtenant/maps (it will be exposed at the web interface).

Vulnerable Product Search on Vulmon Subscribe to Product

aerohive hivemanager classic 8.0r1

aerohive hivemanager classic 8.1r1

Exploits

Aerohive Networks HiveManager Classic Online NMS suffers from a remote shell upload vulnerability ...

Github Repositories

Aerohive HiveManager Classic Privilege Escalation Vulnerability Name Aerohive HiveManager Classic Privilege Escalation Vulnerability Systems Affected HiveManager Classic 80r1 81r1 Severity Medium 66/10 Impact CVSS:30/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L/E:H/RC:C Vendor wwwaerohivecom/ Advisory wwwushit/t