756
VMScore

CVE-2019-12491

Published: 19/06/2019 Updated: 24/08/2020
CVSS v2 Base Score: 8.5 | Impact Score: 10 | Exploitability Score: 6.8
CVSS v3 Base Score: 6.6 | Impact Score: 5.9 | Exploitability Score: 0.7
VMScore: 756
Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C

Vulnerability Summary

OnApp prior to 5.0.0-88, 5.5.0-93, and 6.0.0-196 allows an malicious user to run arbitrary commands with root privileges on servers managed by OnApp for XEN/KVM hypervisors. To exploit the vulnerability an attacker has to have control of a single server on a given cloud (e.g. by renting one). From the source server, the attacker can craft any command and trigger the OnApp platform to execute that command with root privileges on a target server.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

onapp onapp 5.0.0

onapp onapp 5.4.0

onapp onapp 5.5.0

onapp onapp 5.9.0

onapp onapp 5.10.0

onapp onapp 6.0.0

onapp onapp 6.0

onapp onapp 5.6.0

onapp onapp 5.7.0

onapp onapp 5.1.0

onapp onapp 5.2.0

onapp onapp 5.3.0

onapp onapp 5.8.0

Github Repositories

A network packet forensics tool for SSH

Packet Strider (v021) Summary packetStrider for SSH is a packet forensics tool that aims to provide valuable insight into the nature of SSH traffic, shining a light into the corners of SSH network traffic where golden nuggets of information previously lay in the dark The problem that packet strider aims to help with (AKA Why?) SSH is obviously encrypted, yet valuable context