CVE-2015-4027

Current Description

The AcuWVSSchedulerv10 service in Acunetix Web Vulnerability Scanner (WVS) before 10 build 20151125 allows local users to gain privileges via a command parameter in the reporttemplate property in a params JSON object to api/addScan.

Basic Data

PublishedDecember 17, 2015
Last ModifiedAugust 03, 2020
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-264
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score7.2
SeverityHIGH
Exploitability Score3.9
Impact Score10.0
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationAcunetixWeb Vulnerability Scanner********10

Vulnerable Software List

VendorProductVersions
Acunetix Web Vulnerability Scanner *

References

NameSourceURLTags
http://packetstormsecurity.com/files/134602/Acunetix-WVS-10-Local-Privilege-Escalation.htmlhttp://packetstormsecurity.com/files/134602/Acunetix-WVS-10-Local-Privilege-Escalation.htmlMISCExploit
https://www.acunetix.com/blog/releases/acunetix-10-build-includes-security-checks-in-cors-configurations/https://www.acunetix.com/blog/releases/acunetix-10-build-includes-security-checks-in-cors-configuratCONFIRMVendor Advisory
38847https://www.exploit-db.com/exploits/38847/EXPLOIT-DBExploit