CVE-2014-7178
Enalean Tuleap 7.4.99.5 - Remote Command Execution
Severity Score
9.3
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
3
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Enalean Tuleap before 7.5.99.6 allows remote attackers to execute arbitrary commands via the User-Agent header, which is provided to the passthru PHP function.
Enalean Tuleap anterior a 7.5.99.6 permite a atacantes remotos ejecutar comandos arbitrarios a través de la cabecera User-Agent, la cual está proporcionada en la función passthru PHP.
Enalean Tuleap versions 7.4.99.5 and below suffer from a remote command execution vulnerability.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2014-09-25 CVE Reserved
- 2014-10-28 CVE Published
- 2014-10-28 First Exploit
- 2024-08-06 CVE Updated
- 2024-10-10 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
CAPEC
References (4)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/35100 | 2014-10-28 | |
http://seclists.org/fulldisclosure/2014/Oct/121 | 2024-08-06 | |
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7178 | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.tuleap.org/recent-vulnerabilities | 2014-12-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Enalean Search vendor "Enalean" | Tuleap Search vendor "Enalean" for product "Tuleap" | <= 7.5.99.5 Search vendor "Enalean" for product "Tuleap" and version " <= 7.5.99.5" | - |
Affected
|