// For flags

CVE-2018-0015

AppFormix: Debug Shell Command Execution in AppFormix Agent

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A malicious user with unrestricted access to the AppFormix application management platform may be able to access a Python debug console and execute system commands with root privilege. The AppFormix Agent exposes the debug console on a host where AppFormix Agent is executing. If the host is executing AppFormix Agent, an attacker may access the debug console and execute Python commands with root privilege. Affected AppFormix releases are: All versions up to and including 2.7.3; 2.11 versions prior to 2.11.3; 2.15 versions prior to 2.15.2. Juniper SIRT is not aware of any malicious exploitation of this vulnerability, however, the issue has been seen in a production network. No other Juniper Networks products or platforms are affected by this issue.

Un usuario malicioso con acceso sin restricción a la plataforma de gestión de la aplicación AppFormix podría acceder a la consola de depuración de Python y ejecutar comandos del sistema con privilegios root. El agente AppFormix expone la consola de depuración en un host en donde se ejecute el agente de AppFormix. Si el host está ejecutando el agente de AppFormix, un atacante podría acceder a la consola de depuración y ejecutar comandos Python con privilegios root. Las distribuciones del agente de AppFormix son: Todas las versiones hasta la versión 2.7.3 inclusive, versiones 2.11 anteriores a la 2.11.3 y versiones 2.15 anteriores a la 2.15.2. Juniper SIRT no tiene constancia de ninguna explotación de esta vulnerabilidad. Sin embargo, se ha visto el problema en una red de producción. No hay ningún otro producto o plataforma de Juniper Networks que se vea afectado por este problema.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-11-16 CVE Reserved
  • 2018-02-22 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-09-17 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-862: Missing Authorization
CAPEC
References (1)
URL Tag Source
URL Date SRC
URL Date SRC
URL Date SRC
https://kb.juniper.net/JSA10843 2019-10-03
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Juniper
Search vendor "Juniper"
Appformix
Search vendor "Juniper" for product "Appformix"
<= 2.7.3
Search vendor "Juniper" for product "Appformix" and version " <= 2.7.3"
-
Affected
Juniper
Search vendor "Juniper"
Appformix
Search vendor "Juniper" for product "Appformix"
>= 2.11 < 2.11.3
Search vendor "Juniper" for product "Appformix" and version " >= 2.11 < 2.11.3"
-
Affected
Juniper
Search vendor "Juniper"
Appformix
Search vendor "Juniper" for product "Appformix"
>= 2.15 < 2.15.2
Search vendor "Juniper" for product "Appformix" and version " >= 2.15 < 2.15.2"
-
Affected