CVE-2017-18001

Trustwave Secure Web Gateway (SWG) through 11.8.0.27 allows remote attackers to append an arbitrary public key to the device's SSH Authorized Keys data, and consequently obtain remote root access, via the publicKey parameter to the /sendKey URI.
Configurations

Configuration 1 (hide)

cpe:2.3:a:trustwave:secure_web_gateway:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:19

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2017/Dec/88 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2017/Dec/88 - Exploit, Mailing List, Third Party Advisory
References () https://blogs.securiteam.com/index.php/archives/3550 - Exploit, Third Party Advisory () https://blogs.securiteam.com/index.php/archives/3550 - Exploit, Third Party Advisory
References () https://www.exploit-db.com/exploits/44047/ - () https://www.exploit-db.com/exploits/44047/ -
References () https://www.trustwave.com/Resources/Trustwave-Software-Updates/Important-Security-Update-for-Trustwave-Secure-Web-Gateway/ - Vendor Advisory () https://www.trustwave.com/Resources/Trustwave-Software-Updates/Important-Security-Update-for-Trustwave-Secure-Web-Gateway/ - Vendor Advisory

Information

Published : 2017-12-31 19:29

Updated : 2024-11-21 03:19


NVD link : CVE-2017-18001

Mitre link : CVE-2017-18001

CVE.ORG link : CVE-2017-18001


JSON object : View

Products Affected

trustwave

  • secure_web_gateway
CWE
CWE-306

Missing Authentication for Critical Function