WAFPlanet

CVE Database - 2018

Browse known vulnerabilities with WAF coverage analysis. See which CVEs are detectable by Web Application Firewalls and their OWASP CRS rules.

6718
Matching CVEs
15562
Critical
25943
High
66770
High WAF Coverage

CVE-2018-1000830

CRITICAL
10.00 CVSS 3.0

XR3Player version <= V3.124 contains a XML External Entity (XXE) vulnerability in Playlist parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning.

XML External Entity (XXE)
WAF: High

CVE-2018-1000829

CRITICAL
9.00 CVSS 3.0

Anyplace version before commit 80359b4 contains a XML External Entity (XXE) vulnerability in Man in the middle on map API call that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This vulnerability appears to have been fixed in after commit 80359b4.

XML External Entity (XXE)
WAF: High

CVE-2018-1000828

CRITICAL
9.00 CVSS 3.1

FrostWire version <= frostwire-desktop-6.7.4-build-272 contains a XML External Entity (XXE) vulnerability in Man in the middle on update that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This attack appear to be exploitable via Man in the middle the call to update the software.

XML External Entity (XXE)
WAF: High

CVE-2018-1000827

CRITICAL
9.80 CVSS 3.0

Ubilling version <= 0.9.2 contains a Other/Unknown vulnerability in user-controlled parameter that can result in Disclosure of confidential data, denial of service, SSRF, remote code execution.

Insecure Deserialization
WAF: Medium

CVE-2018-1000826

MEDIUM
6.10 CVSS 3.0

Microweber version <= 1.0.7 contains a Cross Site Scripting (XSS) vulnerability in Admin login form template that can result in Execution of JavaScript code.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-1000825

CRITICAL
10.00 CVSS 3.0

FreeCol version <= nightly-2018-08-22 contains a XML External Entity (XXE) vulnerability in FreeColXMLReader parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This attack appear to be exploitable via Freecol file.

XML External Entity (XXE)
WAF: High

CVE-2018-1000824

CRITICAL
9.80 CVSS 3.0

MegaMek version < v0.45.1 contains a Other/Unknown vulnerability in Object Stream Connection that can result in Disclosure of confidential data, denial of service, SSRF, remote code execution.

Insecure Deserialization
WAF: Medium

CVE-2018-1000823

CRITICAL
10.00 CVSS 3.1

exist version <= 5.0.0-RC4 contains a XML External Entity (XXE) vulnerability in XML Parser for REST Server that can result in Disclosure of confidential data, denial of service, SSRF, port scanning.

XML External Entity (XXE)
WAF: High

CVE-2018-1000822

CRITICAL
10.00 CVSS 3.0

codelibs fess version before commit faa265b contains a XML External Entity (XXE) vulnerability in GSA XML file parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This attack appear to be exploitable via specially crafted GSA XML files. This vulnerability appears to have been fixed in after commit faa265b.

XML External Entity (XXE)
WAF: High

CVE-2018-1000821

CRITICAL
10.00 CVSS 3.0

MicroMathematics version before commit 5c05ac8 contains a XML External Entity (XXE) vulnerability in SMathStudio files that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This attack appear to be exploitable via Specially crafted SMathStudio files. This vulnerability appears to have been fixed in after commit 5c05ac8.

XML External Entity (XXE)
WAF: High

CVE-2018-1000820

CRITICAL
10.00 CVSS 3.0

neo4j-contrib neo4j-apoc-procedures version before commit 45bc09c contains a XML External Entity (XXE) vulnerability in XML Parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This vulnerability appears to have been fixed in after commit 45bc09c.

XML External Entity (XXE)
WAF: High

CVE-2018-1000817

HIGH
7.50 CVSS 3.0

Asset Pipeline Grails Plugin Asset-pipeline plugin version Prior to 2.14.1.1, 2.15.1 and 3.0.6 contains a Incorrect Access Control vulnerability in Applications deployed in Jetty that can result in Download .class files and any arbitrary file. This attack appear to be exploitable via Specially crafted GET request containing directory traversal from assets-pipeline context. This vulnerability appears to have been fixed in 2.14.1.1 (for Grails 2.x), 2.15.1 (for Grails 3 and Java 7) and 3.0.6 (for Grails 3 and Java 8).

Path Traversal
WAF: High

CVE-2018-1000816

MEDIUM
5.40 CVSS 3.0

Grafana version confirmed for 5.2.4 and 5.3.0 contains a Cross Site Scripting (XSS) vulnerability in Influxdb and Graphite query editor that can result in Running arbitrary js code in victims browser.. This attack appear to be exploitable via Authenticated user must click on the input field where the payload was previously inserted..

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-1000815

MEDIUM
4.30 CVSS 3.0

Brave Software Inc. Brave version version 0.22.810 to 0.24.0 contains a Other/Unknown vulnerability in function ContentSettingsObserver::AllowScript() in content_settings_observer.cc that can result in Websites can run inline JavaScript even if script is blocked, making attackers easier to track users. This attack appear to be exploitable via the victim must visit a specially crafted website. This vulnerability appears to have been fixed in 0.25.2.

Improper Input Validation
WAF: Medium

CVE-2018-1000813

MEDIUM
4.80 CVSS 3.0

Backdrop CMS version 1.11.0 and earlier contains a Cross Site Scripting (XSS) vulnerability in Sanitization of custom class names used on blocks and layouts. that can result in Execution of JavaScript from an unexpected source.. This attack appear to be exploitable via A user must be directed to an affected page while logged in.. This vulnerability appears to have been fixed in 1.11.1 and later.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-1000811

HIGH
8.80 CVSS 3.0

bludit version 3.0.0 contains a Unrestricted Upload of File with Dangerous Type vulnerability in Content Upload in Pages Editor that can result in Remote Command Execution. This attack appear to be exploitable via malicious user have to upload a crafted payload containing PHP code.

Unrestricted File Upload
WAF: Medium

CVE-2018-5199

HIGH
8.80 CVSS 3.1

In Veraport G3 ALL on MacOS, due to insufficient domain validation, It is possible to overwrite installation file to malicious file. A remote unauthenticated attacker may use this vulnerability to execute arbitrary file.

Improper Input Validation
WAF: Medium

CVE-2018-1973

HIGH
7.20 CVSS 3.0

IBM API Connect 5.0.0.0 through 5.0.8.4 allows a user with limited 'API Administrator level access to give themselves full 'Administrator' level access through the members functionality. IBM X-Force ID: 153914.

Improper Privilege Management
WAF: Low

CVE-2018-1778

HIGH
8.10 CVSS 3.0

IBM LoopBack (IBM API Connect 2018.1, 2018.4.1, 5.0.8.0, and 5.0.8.4) could allow an attacker to bypass authentication if the AccessToken Model is exposed over a REST API, it is then possible for anyone to create an AccessToken for any User provided they know the userId and can hence get access to the other user&#195;&#162;&#194;&#128;&#194;&#153;s data / access to their privileges (if the user happens to be an Admin for example). IBM X-Force ID: 148801.

Improper Authentication
WAF: Low

CVE-2018-1661

HIGH
8.80 CVSS 3.0

IBM DataPower Gateways 7.5, 7.5.1, 7.5.2, and 7.6 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 144887.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2018-20306

MEDIUM
5.40 CVSS 3.0

A stored cross-site scripting (XSS) vulnerability in the web administration user interface of Pulse Secure Virtual Traffic Manager may allow a remote authenticated attacker to inject web script or HTML via a crafted website and steal sensitive data and credentials. Affected releases are Pulse Secure Virtual Traffic Manager 9.9 versions prior to 9.9r2 and 10.4r1.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20301

MEDIUM
6.50 CVSS 3.0

An issue was discovered in Steve Pallen Coherence before 0.5.2 that is similar to a Mass Assignment vulnerability. In particular, "registration" endpoints (e.g., creating, editing, updating) allow users to update any coherence_fields data. For example, users can automatically confirm their accounts by sending the confirmed_at parameter with their registration request.

Improper Input Validation
WAF: Medium

CVE-2018-20303

HIGH
7.50 CVSS 3.0

In pkg/tool/path.go in Gogs before 0.11.82.1218, a directory traversal in the file-upload functionality can allow an attacker to create a file under data/sessions on the server, a similar issue to CVE-2018-18925.

Path Traversal
WAF: High

CVE-2018-20302

MEDIUM
6.10 CVSS 3.0

An XSS issue was discovered in Steve Pallen Xain before 0.6.2 via the order parameter.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20300

CRITICAL
9.80 CVSS 3.0

Empire CMS 7.5 allows remote attackers to execute arbitrary PHP code via the ftemp parameter in an enews=EditMemberForm action because this code is injected into a memberform.$fid.php file.

Code Injection
WAF: Medium

CVE-2018-15798

MEDIUM
5.40 CVSS 3.0

Pivotal Concourse Release, versions 4.x prior to 4.2.2, login flow allows redirects to untrusted websites. A remote unauthenticated attacker could convince a user to click on a link using the oAuth redirect link with an untrusted website and gain access to that user's access token in Concourse.

Open Redirect
WAF: Medium

CVE-2018-11799

MEDIUM
6.50 CVSS 3.0

Vulnerability allows a user of Apache Oozie 3.1.3-incubating to 5.0.0 to impersonate other users. The malicious user can construct an XML that results workflows running in other user's name.

Improper Input Validation
WAF: Medium

CVE-2018-19598

MEDIUM
4.80 CVSS 3.0

Statamic 2.10.3 allows XSS via First Name or Last Name to the /users URI in an 'Add new user' request.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-19597

MEDIUM
4.80 CVSS 3.0

CMS Made Simple 2.2.8 allows XSS via an uploaded SVG document, a related issue to CVE-2017-16798.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-19596

MEDIUM
4.80 CVSS 3.0

Zurmo 3.2.4 allows HTML Injection via an admin's use of HTML in the report section, a related issue to CVE-2018-19506.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-19508

MEDIUM
4.80 CVSS 3.0

CMSimple 4.7.5 has XSS via an admin's upload of an SVG file at a ?userfiles&subdir=userfiles/images/flags/ URI.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-19507

MEDIUM
4.80 CVSS 3.0

CMSimple 4.7.5 has XSS via an admin's use of a ?file=config&action=array URI.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-19506

MEDIUM
4.80 CVSS 3.0

Zurmo 3.2.4 has XSS via an admin's use of the name parameter in the reports section, aka the app/index.php/reports/default/details?id=1 URI.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-18999

HIGH
7.30 CVSS 3.1

WebAccess/SCADA, WebAccess/SCADA Version 8.3.2 installed on Windows 2008 R2 SP1. Lack of proper validation of user supplied input may allow an attacker to cause the overflow of a buffer on the stack.

Improper Input Validation
WAF: Medium

CVE-2018-20298

MEDIUM
6.50 CVSS 3.0

S3 Browser before 8.1.5 contains an XML external entity (XXE) vulnerability, allowing remote attackers to read arbitrary files and obtain NTLMv2 hash values by tricking a user into connecting to a malicious server via the S3 protocol.

XML External Entity (XXE)
WAF: High

CVE-2018-17195

HIGH
7.50 CVSS 3.0

The template upload API endpoint accepted requests from different domain when sent in conjunction with ARP spoofing + man in the middle (MiTM) attack, resulting in a CSRF attack. The required attack vector is complex, requiring a scenario with client certificate authentication, same subnet access, and injecting malicious code into an unprotected (plaintext HTTP) website which the targeted user later visits, but the possible damage warranted a Severe severity level. Mitigation: The fix to apply Cross-Origin Resource Sharing (CORS) policy request filtering was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release.

Incorrect Authorization
WAF: Low

CVE-2018-17194

HIGH
7.50 CVSS 3.0

When a client request to a cluster node was replicated to other nodes in the cluster for verification, the Content-Length was forwarded. On a DELETE request, the body was ignored, but if the initial request had a Content-Length value other than 0, the receiving nodes would wait for the body and eventually timeout. Mitigation: The fix to check DELETE requests and overwrite non-zero Content-Length header values was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release.

Improper Input Validation
WAF: Medium

CVE-2018-17193

MEDIUM
6.10 CVSS 3.0

The message-page.jsp error page used the value of the HTTP request header X-ProxyContextPath without sanitization, resulting in a reflected XSS attack. Mitigation: The fix to correctly parse and sanitize the request attribute value was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20231

HIGH
8.80 CVSS 3.0

Cross Site Request Forgery (CSRF) in the two-factor-authentication plugin before 1.3.13 for WordPress allows remote attackers to disable 2FA via the tfa_enable_tfa parameter due to missing nonce validation.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2018-20228

HIGH
8.00 CVSS 3.0

Subsonic V6.1.5 allows internetRadioSettings.view streamUrl CSRF, with resultant SSRF.

Cross-Site Request Forgery (CSRF) Server-Side Request Forgery (SSRF)
WAF: Medium

CVE-2018-20227

HIGH
7.50 CVSS 3.1

RDF4J 2.4.2 allows Directory Traversal via ../ in an entry in a ZIP archive.

Path Traversal
WAF: High

CVE-2018-19829

MEDIUM
6.50 CVSS 3.0

Artica Integria IMS 5.0.83 has CSRF in godmode/usuarios/lista_usuarios, resulting in the ability to delete an arbitrary user when the ID number is known.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2018-19790

MEDIUM
6.10 CVSS 3.0

An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restrictions and effectively redirect the user to any domain after login.

Open Redirect
WAF: Medium

CVE-2018-19789

MEDIUM
5.30 CVSS 3.0

An issue was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9, and 4.2.x before 4.2.1. When using the scalar type hint `string` in a setter method (e.g. `setName(string $name)`) of a class that's the `data_class` of a form, and when a file upload is submitted to the corresponding field instead of a normal text input, then `UploadedFile::__toString()` is called which will then return and disclose the path of the uploaded file. If combined with a local file inclusion issue in certain circumstances this could escalate it to a Remote Code Execution.

Unrestricted File Upload
WAF: Medium

CVE-2018-18921

MEDIUM
6.50 CVSS 3.0

PHP Server Monitor before 3.3.2 has CSRF, as demonstrated by a Delete action.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2018-17777

CRITICAL
9.80 CVSS 3.1

An issue was discovered on D-Link DVA-5592 A1_WI_20180823 devices. If the PIN of the page "/ui/cbpc/login" is the default Parental Control PIN (0000), it is possible to bypass the login form by editing the path of the cookie "sid" generated by the page. The attacker will have access to the router control panel with administrator privileges.

Improper Authentication
WAF: Low

CVE-2018-19522

MEDIUM
5.50 CVSS 3.1

DriverAgent 2.2015.7.14, which includes DrvAgent64.sys 1.0.0.1, allows a user to send an IOCTL (0x800020F4) with a buffer containing user defined content. The driver's subroutine will execute a wrmsr instruction with the user's buffer for partial input.

Improper Input Validation
WAF: Medium

CVE-2018-7804

MEDIUM
6.10 CVSS 3.0

A URL Redirection to Untrusted Site vulnerability exists in the embedded web servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200 where a user clicking on a specially crafted link can be redirected to a URL of the attacker's choosing.

Open Redirect
WAF: Medium

CVE-2018-7797

MEDIUM
6.10 CVSS 3.0

A URL redirection vulnerability exists in Power Monitoring Expert, Energy Expert (formerly Power Manager) - EcoStruxure Power Monitoring Expert (PME) v8.2 (all editions), EcoStruxure Energy Expert 1.3 (formerly Power Manager), EcoStruxure Power SCADA Operation (PSO) 8.2 Advanced Reports and Dashboards Module, EcoStruxure Power Monitoring Expert (PME) v9.0, EcoStruxure Energy Expert v2.0, and EcoStruxure Power SCADA Operation (PSO) 9.0 Advanced Reports and Dashboards Module which could cause a phishing attack when redirected to a malicious site.

Open Redirect
WAF: Medium

CVE-2018-20189

MEDIUM
6.50 CVSS 3.0

In GraphicsMagick 1.3.31, the ReadDIBImage function of coders/dib.c has a vulnerability allowing a crash and denial of service via a dib file that is crafted to appear with direct pixel values and also colormapping (which is not available beyond 8-bits/sample), and therefore lacks indexes initialization.

Improper Input Validation
WAF: Medium
Page 5 of 135 (6718 CVEs)