Adaptive Computing Moab before 7.2.9 and 8 before 8.0.0 allows remote attackers to bypass the signature check, impersonate arbitrary users, and execute commands via a message without a signature.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/128483/Moab-Dynamic-Configuration-Authentication-Bypass.html - Exploit | |
References | () http://www.adaptivecomputing.com/security-advisory/ - Vendor Advisory | |
References | () http://www.exploit-db.com/exploits/34865 - Exploit | |
References | () http://www.securityfocus.com/archive/1/533574/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/70173 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/96699 - |
Information
Published : 2014-10-08 19:55
Updated : 2024-11-21 02:11
NVD link : CVE-2014-5300
Mitre link : CVE-2014-5300
CVE.ORG link : CVE-2014-5300
JSON object : View
Products Affected
adaptivecomputing
- moab
CWE
CWE-287
Improper Authentication