// For flags

CVE-2018-1313

 

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

In Apache Derby 10.3.1.4 to 10.14.1.0, a specially-crafted network packet can be used to request the Derby Network Server to boot a database whose location and contents are under the user's control. If the Derby Network Server is not running with a Java Security Manager policy file, the attack is successful. If the server is using a policy file, the policy file must permit the database location to be read for the attack to work. The default Derby Network Server policy file distributed with the affected releases includes a permissive policy as the default Network Server policy, which allows the attack to work.

En Apache Derby 10.3.1.4 a 10.14.1.0, un paquete de red especialmente manipulado puede emplearse para solicitar que Derby Network Server cargue una base de datos cuya ubicación y contenido están bajo el control del usuario. Si Derby Network Server no se está ejecutando con un archivo de políticas de Java Security Manager, el ataque tendrá éxito. Si el servidor está usando un archivo de políticas, este archivo debe permitir que la ubicación de la base de datos pueda leerse para que el ataque funcione. El archivo de políticas de Derby Network Server por defecto distribuido con las versiones afectadas incluye una política permisiva como la política por defecto del servidor de red, lo que permite que el ataque funcione.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-12-07 CVE Reserved
  • 2018-05-07 CVE Published
  • 2018-11-19 First Exploit
  • 2023-11-08 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Derby
Search vendor "Apache" for product "Derby"
>= 10.3.1.4 <= 10.14.1.0
Search vendor "Apache" for product "Derby" and version " >= 10.3.1.4 <= 10.14.1.0"
-
Affected
Oracle
Search vendor "Oracle"
Weblogic Server
Search vendor "Oracle" for product "Weblogic Server"
12.2.1.3
Search vendor "Oracle" for product "Weblogic Server" and version "12.2.1.3"
-
Affected