CVE-2016-1587

The Snapweb interface before version 0.21.2 was exposing controls to install or remove snap packages without controlling the identity of the user, nor the origin of the connection. An attacker could have used the controls to remotely add a valid, but malicious, snap package, from the Store, potentially using system resources without permission from the legitimate administrator of the system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:snapweb:snapweb:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:46

Type Values Removed Values Added
References () https://github.com/snapcore/snapweb/commit/3f4cf9403f7687fbc8e27c0e01b2cf6aa5e7e0d5 - Patch, Third Party Advisory () https://github.com/snapcore/snapweb/commit/3f4cf9403f7687fbc8e27c0e01b2cf6aa5e7e0d5 - Patch, Third Party Advisory
CVSS v2 : 5.0
v3 : 7.5
v2 : 5.0
v3 : 7.1

Information

Published : 2019-04-22 16:29

Updated : 2024-11-21 02:46


NVD link : CVE-2016-1587

Mitre link : CVE-2016-1587

CVE.ORG link : CVE-2016-1587


JSON object : View

Products Affected

snapweb

  • snapweb
CWE
CWE-284

Improper Access Control