WAFPlanet

CVE Database - 2018

Browse known vulnerabilities with WAF coverage analysis. See which CVEs are detectable by Web Application Firewalls and their OWASP CRS rules.

6718
Matching CVEs
15562
Critical
25943
High
66770
High WAF Coverage

CVE-2018-6333

CRITICAL
9.80 CVSS 3.0

The hhvm-attach deep link handler in Nuclide did not properly sanitize the provided hostname parameter when rendering. As a result, a malicious URL could be used to render HTML and other content inside of the editor's context, which could potentially be chained to lead to code execution. This issue affected Nuclide prior to v0.290.0.

Cross-Site Scripting (XSS) Improper Input Validation
WAF: High

CVE-2018-6331

CRITICAL
9.80 CVSS 3.0

Buck parser-cache command loads/saves state using Java serialized object. If the state information is maliciously crafted, deserializing it could lead to code execution. This issue affects Buck versions prior to v2018.06.25.01.

Insecure Deserialization
WAF: Medium

CVE-2018-6347

HIGH
7.50 CVSS 3.0

An issue in the Proxygen handling of HTTP2 parsing of headers/trailers can lead to a denial-of-service attack. This affects Proxygen prior to v2018.12.31.00.

Uncontrolled Resource Consumption Improper Input Validation
WAF: Medium

CVE-2018-6346

HIGH
7.50 CVSS 3.0

A potential denial-of-service issue in the Proxygen handling of invalid HTTP2 priority settings (specifically a circular dependency). This affects Proxygen prior to v2018.12.31.00.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2018-6343

HIGH
7.50 CVSS 3.0

Proxygen fails to validate that a secondary auth manager is set before dereferencing it. That can cause a denial of service issue when parsing a Certificate/CertificateRequest HTTP2 Frame over a fizz (TLS 1.3) transport. This issue affects Proxygen releases starting from v2018.10.29.00 until the fix in v2018.11.19.00.

Improper Input Validation
WAF: Medium

CVE-2018-6342

CRITICAL
9.80 CVSS 3.1

react-dev-utils on Windows allows developers to run a local webserver for accepting various commands, including a command to launch an editor. The input to that command was not properly sanitized, allowing an attacker who can make a network request to the server (either via CSRF or by direct request) to execute arbitrary commands on the targeted system. This issue affects multiple branches: 1.x.x prior to 1.0.4, 2.x.x prior to 2.0.2, 3.x.x prior to 3.1.2, 4.x.x prior to 4.2.2, and 5.x.x prior to 5.0.2.

OS Command Injection
WAF: High

CVE-2018-6341

MEDIUM
6.10 CVSS 3.0

React applications which rendered to HTML using the ReactDOMServer API were not escaping user-supplied attribute names at render-time. That lack of escaping could lead to a cross-site scripting vulnerability. This issue affected minor releases 16.0.x, 16.1.x, 16.2.x, 16.3.x, and 16.4.x. It was fixed in 16.0.1, 16.1.2, 16.2.1, 16.3.3, and 16.4.2.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-6335

HIGH
7.50 CVSS 3.0

A Malformed h2 frame can cause 'std::out_of_range' exception when parsing priority meta data. This behavior can lead to denial-of-service. This affects all supported versions of HHVM (3.25.2, 3.24.6, and 3.21.10 and below) when using the proxygen server to handle HTTP2 requests.

Uncontrolled Resource Consumption Improper Input Validation
WAF: Medium

CVE-2018-6334

CRITICAL
9.80 CVSS 3.0

Multipart-file uploads call variables to be improperly registered in the global scope. In cases where variables are not declared explicitly before being used this can lead to unexpected behavior. This affects all supported versions of HHVM prior to the patch (3.25.1, 3.24.5, and 3.21.9 and below).

Improper Input Validation
WAF: Medium

CVE-2018-19937

MEDIUM
6.60 CVSS 3.0

A local, authenticated attacker can bypass the passcode in the VideoLAN VLC media player app before 3.1.5 for iOS by opening a URL and turning the phone.

Improper Authentication
WAF: Low

CVE-2018-18600

HIGH
8.10 CVSS 3.0

The remote upgrade feature in Guardzilla GZ180 devices allow command injection via a crafted new firmware version parameter.

OS Command Injection
WAF: High

CVE-2018-19918

MEDIUM
5.40 CVSS 3.0

CuppaCMS has XSS via an SVG document uploaded to the administrator/#/component/table_manager/view/cu_views URI.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-19906

MEDIUM
5.40 CVSS 3.0

Stored XSS exists in razorCMS 3.4.8 via the /#/page description parameter.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-19905

MEDIUM
5.40 CVSS 3.0

HTML injection exists in razorCMS 3.4.8 via the /#/page keywords parameter.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-19904

MEDIUM
6.10 CVSS 3.0

Persistent XSS exists in XSLT CMS via the create/?action=items.edit&type=Page "body" field.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-19903

MEDIUM
6.10 CVSS 3.0

Persistent XSS exists in XSLT CMS via the create/?action=items.edit&type=Page title field.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-19902

MEDIUM
4.80 CVSS 3.0

No-CMS 1.1.3 is prone to Persistent XSS via the blog/manage_article "keyword" parameter.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-19901

MEDIUM
4.80 CVSS 3.0

No-CMS 1.1.3 is prone to Persistent XSS via the blog/manage_article/index/ "article_title" parameter.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-19845

MEDIUM
5.40 CVSS 3.0

There is Stored XSS in GetSimple CMS 3.3.12 via the admin/edit.php "post-menu" parameter, a related issue to CVE-2018-16325.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-19844

MEDIUM
4.80 CVSS 3.0

FROG CMS 0.9.5 has XSS via the admin/?/snippet/add name parameter, which is mishandled during an edit action, a related issue to CVE-2018-10319.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-18593

HIGH
7.50 CVSS 3.0

Remote Directory Traversal and Remote Disclosure of Privileged Information in UCMDB Configuration Management Service, version 10.22, 10.22 CUP1, 10.22 CUP2, 10.22 CUP3, 10.22 CUP4, 10.22 CUP5, 10.22 CUP6, 10.22 CUP7, 10.33, 10.33 CUP1, 10.33 CUP2, 10.33 CUP3, 2018.02, 2018.05, 2018.08, 2018.11. The vulnerabilities could allow Remote Directory Traversal and Remote Disclosure of Privileged Information

Path Traversal
WAF: High

CVE-2018-20614

HIGH
7.50 CVSS 3.0

public\install\install.php in CIM 0.9.3 allows remote attackers to reload the product via the public/install/#/step3 URI.

Improper Input Validation
WAF: Medium

CVE-2018-20613

HIGH
8.80 CVSS 3.0

TEMMOKU T1.09 Beta allows admin/user/add CSRF.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2018-20612

HIGH
8.80 CVSS 3.0

UWA 2.3.11 allows index.php?g=admin&c=admin&a=add_admin_do CSRF.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2018-20611

MEDIUM
6.10 CVSS 3.0

imcat 4.4 allow XSS via a crafted cookie to the root/tools/adbug/binfo.php?cookie URI.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20610

MEDIUM
4.90 CVSS 3.0

imcat 4.4 allows directory traversal via the root/run/adm.php efile parameter.

Path Traversal
WAF: High

CVE-2018-20605

CRITICAL
9.80 CVSS 3.0

imcat 4.4 allows remote attackers to execute arbitrary PHP code by using root/run/adm.php to modify the boot/bootskip.php file.

Code Injection
WAF: Medium

CVE-2018-20604

MEDIUM
4.90 CVSS 3.0

Lei Feng TV CMS (aka LFCMS) 3.8.6 allows Directory Traversal via crafted use of ..* in Template/edit/path URIs, as demonstrated by the admin.php?s=/Template/edit/path/*web*..*..*..*..*1.txt.html URI to read the 1.txt file.

Path Traversal
WAF: High

CVE-2018-20603

HIGH
8.80 CVSS 3.0

Lei Feng TV CMS (aka LFCMS) 3.8.6 allows admin.php?s=/Member/add.html CSRF.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2018-20601

MEDIUM
4.80 CVSS 3.0

UCMS 1.4.7 has XSS via the description parameter in an index.php list_editpost action.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20600

MEDIUM
6.10 CVSS 3.0

sadmin\cedit.php in UCMS 1.4.7 has XSS via an index.php sadmin_cedit action.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20599

HIGH
8.80 CVSS 3.0

UCMS 1.4.7 allows remote attackers to execute arbitrary PHP code by entering this code during an index.php sadmin_fileedit action.

Code Injection
WAF: Medium

CVE-2018-20598

HIGH
8.80 CVSS 3.0

UCMS 1.4.7 has ?do=user_addpost CSRF.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2018-20597

MEDIUM
4.80 CVSS 3.0

UCMS 1.4.7 has XSS via the dir parameter in an index.php sadmin_fileedit action.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20596

CRITICAL
9.80 CVSS 3.0

Jspxcms v9.0.0 allows SSRF.

Server-Side Request Forgery (SSRF)
WAF: Medium

CVE-2018-20595

HIGH
8.80 CVSS 3.0

A CSRF issue was discovered in web/authorization/oauth2/controller/OAuth2ClientController.java in hsweb 3.0.4 because the state parameter in the request is not compared with the state parameter in the session after user authentication is successful.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2018-20594

MEDIUM
6.10 CVSS 3.0

An issue was discovered in hsweb 3.0.4. It is a reflected XSS vulnerability due to the absence of type parameter checking in FlowableModelManagerController.java.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20590

MEDIUM
4.80 CVSS 3.1

Ivan Cordoba Generic Content Management System (CMS) through 2018-04-28 has XSS via the Administrator/users.php user ID.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20589

MEDIUM
4.80 CVSS 3.0

Ivan Cordoba Generic Content Management System (CMS) through 2018-04-28 has XSS via the Administrator/add_pictures.php article ID.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20583

MEDIUM
6.10 CVSS 3.0

Cross-site scripting (XSS) vulnerability in the PHP League CommonMark library versions 0.15.6 through 0.18.x before 0.18.1 allows remote attackers to insert unsafe URLs into HTML (even if allow_unsafe_links is false) via a newline character (e.g., writing javascript as javascri%0apt).

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-15007

HIGH
7.80 CVSS 3.0

The Sky Elite 6.0L+ Android device with a build fingerprint of SKY/x6069_trx_l601_sky/x6069_trx_l601_sky:6.0/MRA58K/1482897127:user/release-keys contains a pre-installed platform app with a package name of com.fw.upgrade.sysoper (versionCode=238, versionName=2.3.8) that contains an exported broadcast receiver app component named com.adups.fota.sysoper.WriteCommandReceiver that allows any app co-located on the device to supply arbitrary commands to be executed as the system user. The com.fw.upgrade.sysoper app cannot be disabled by the user and the attack can be performed by a zero-permission app. Executing commands as system user can allow a third-party app to video record the user's screen, factory reset the device, obtain the user's notifications, read the logcat logs, inject events in the Graphical User Interface (GUI), change the default Input Method Editor (IME) (e.g., keyboard) with one contained within the attacking app that contains keylogging functionality, obtain the user's text messages, and more.

OS Command Injection
WAF: High

CVE-2018-15005

HIGH
7.10 CVSS 3.0

The ZTE ZMAX Champ Android device with a build fingerprint of ZTE/Z917VL/fortune:6.0.1/MMB29M/20170327.120922:user/release-keys contains a pre-installed platform app with a package name of com.zte.zdm.sdm (versionCode=31, versionName=V5.0.3) that contains an exported broadcast receiver app component named com.zte.zdm.VdmcBroadcastReceiver that allows any app co-located on the device to programmatically initiate a factory reset. In addition, the app initiating the factory reset does not require any permissions. A factory reset will remove all user data and apps from the device. This will result in the loss of any data that have not been backed up or synced externally. The capability to perform a factory reset is not directly available to third-party apps (those that the user installs themselves with the exception of enabled Mobile Device Management (MDM) apps), although this capability can be obtained by leveraging an unprotected app component of a pre-installed platform app.

Missing Authorization
WAF: Low

CVE-2018-14998

MEDIUM
6.80 CVSS 3.0

The Leagoo P1 Android device with a build fingerprint of sp7731c_1h10_32v4_bird:6.0/MRA58K/android.20170629.214736:user/release-keys contains a hidden root privilege escalation capability to achieve command execution as the root user. They have made modifications that allow a user with physical access to the device to obtain a root shell via ADB by modifying read-only system properties at runtime. Specifically, modifying the ro.debuggable and the ro.secure system properties to a certain value and then restarting the ADB daemon allows for a root shell to be obtained via ADB.

OS Command Injection
WAF: High

CVE-2018-14988

HIGH
7.50 CVSS 3.0

The MXQ TV Box 4.4.2 Android device with a build fingerprint of MBX/m201_N/m201_N:4.4.2/KOT49H/20160106:user/test-keys contains the Android framework with a package name of android (versionCode=19, versionName=4.4.2-20170213) that contains an exported broadcast receiver application component that, when called, will make the device inoperable. The vulnerable component named com.android.server.SystemRestoreReceiver will write a value of --restore_system\n--locale=<localeto the /cache/recovery/command file and boot into recovery mode. During this process, it appears that when booting into recovery mode, the system partition gets formatted or modified and will be unable to boot properly thereafter. After the device wouldn't boot properly, a factory reset of the device in recovery mode does not regain properly functionality of the device. The com.android.server.SystemRestoreReceiver broadcast receiver app component is accessible to any app co-located on the device and does not require any permission to access. The user can most likely recover the device by flashing clean firmware images placed on an SD card.

Improper Input Validation
WAF: Medium

CVE-2018-14985

HIGH
7.10 CVSS 3.0

The Leagoo Z5C Android device with a build fingerprint of sp7731c_1h10_32v4_bird:6.0/MRA58K/android.20170629.214736:user/release-keys contains a pre-installed platform app with a package name of com.android.settings (versionCode=23, versionName=6.0-android.20170630.092853) that contains an exported broadcast receiver that allows any app co-located on the device to programmatically initiate a factory reset. In addition, the app initiating the factory reset does not require any permissions. A factory reset will remove all user data and apps from the device. This will result in the loss of any data that have not been backed up or synced externally. The capability to perform a factory reset is not directly available to third-party apps (those that the user installs themselves with the exception of enabled Mobile Device Management (MDM) apps), although this capability can be obtained by leveraging an unprotected app component of a pre-installed platform app.

Missing Authorization
WAF: Low

CVE-2018-20577

CRITICAL
9.10 CVSS 3.0

Orange Livebox 00.96.320S devices allow cgi-bin/restore.exe, cgi-bin/firewall_SPI.exe, cgi-bin/setup_remote_mgmt.exe, cgi-bin/setup_pass.exe, and cgi-bin/upgradep.exe CSRF. This is related to Firmware 01.11.2017-11:43:44, Boot v0.70.03, Modem 5.4.1.10.1.1A, Hardware 02, and Arcadyan ARV7519RW22-A-L T VR9 1.2.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2018-20576

MEDIUM
5.40 CVSS 3.0

Orange Livebox 00.96.320S devices allow cgi-bin/autodialing.exe and cgi-bin/phone_test.exe CSRF, leading to arbitrary outbound telephone calls to an attacker-specified telephone number. This is related to Firmware 01.11.2017-11:43:44, Boot v0.70.03, Modem 5.4.1.10.1.1A, Hardware 02, and Arcadyan ARV7519RW22-A-L T VR9 1.2.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2018-20575

HIGH
7.50 CVSS 3.0

Orange Livebox 00.96.320S devices have an undocumented /system_firmwarel.stm URI for manual firmware update. This is related to Firmware 01.11.2017-11:43:44, Boot v0.70.03, Modem 5.4.1.10.1.1A, Hardware 02, and Arcadyan ARV7519RW22-A-L T VR9 1.2.

Improper Input Validation
WAF: Medium

CVE-2018-18696

HIGH
8.80 CVSS 3.0

main.aspx in Microstrategy Analytics 10.4.0026.0049 and earlier has CSRF. NOTE: The vendor claims that documentation for preventing a CSRF attack has been provided (https://community.microstrategy.com/s/article/KB37643-New-security-feature-introduced-in-MicroStrategy-Web-9-0?language=en_US) and disagrees that this issue is a vulnerability. They also claim that MicroStrategy was never properly informed of this issue via normal support channels or their vulnerability reporting page on their website, so they were unable to evaluate the report or explain how this is something their customers view as a feature and not a security vulnerability

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2018-16638

MEDIUM
5.40 CVSS 3.0

Evolution CMS 1.4.x allows XSS via the manager/ search parameter.

Cross-Site Scripting (XSS)
WAF: High
Page 1 of 135 (6718 CVEs)