CVE-2016-7955

The logcheck function in session.inc in AlienVault OSSIM before 5.3.1, when an action has been created, and USM before 5.3.1 allows remote attackers to bypass authentication and consequently obtain sensitive information, modify the application, or execute arbitrary code as root via an "AV Report Scheduler" HTTP User-Agent header.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:alienvault:ossim:*:*:*:*:*:*:*:*
cpe:2.3:a:alienvault:unified_security_management:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:58

Type Values Removed Values Added
References () http://www.securityfocus.com/archive/1/540224/100/0/threaded - () http://www.securityfocus.com/archive/1/540224/100/0/threaded -
References () http://www.zerodayinitiative.com/advisories/ZDI-16-517/ - Third Party Advisory, VDB Entry () http://www.zerodayinitiative.com/advisories/ZDI-16-517/ - Third Party Advisory, VDB Entry
References () https://www.alienvault.com/forums/discussion/7765/alienvault-v5-3-1-hotfix - Vendor Advisory () https://www.alienvault.com/forums/discussion/7765/alienvault-v5-3-1-hotfix - Vendor Advisory

Information

Published : 2017-03-15 16:59

Updated : 2024-11-21 02:58


NVD link : CVE-2016-7955

Mitre link : CVE-2016-7955

CVE.ORG link : CVE-2016-7955


JSON object : View

Products Affected

alienvault

  • unified_security_management
  • ossim
CWE
CWE-264

Permissions, Privileges, and Access Controls