OpenWrt mishandles access control in /etc/config/rpcd and the /usr/share/rpcd/acl.d files, which allows remote authenticated users to call arbitrary methods (i.e., achieve ubus access over HTTP) that were only supposed to be accessible to a specific user, as demonstrated by the file, log, and service namespaces, potentially leading to remote Information Disclosure or Code Execution. NOTE: The developer disputes this as a vulnerability, indicating that rpcd functions appropriately
References
Configurations
History
21 Nov 2024, 03:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.hac425.top/2018/05/16/openwrt_rpcd_acl_fail.html - Third Party Advisory | |
References | () https://forum.openwrt.org/t/rpcd-vulnerability-reported-on-vultdb/16497/3 - |
07 Nov 2023, 02:51
Type | Values Removed | Values Added |
---|---|---|
Summary | OpenWrt mishandles access control in /etc/config/rpcd and the /usr/share/rpcd/acl.d files, which allows remote authenticated users to call arbitrary methods (i.e., achieve ubus access over HTTP) that were only supposed to be accessible to a specific user, as demonstrated by the file, log, and service namespaces, potentially leading to remote Information Disclosure or Code Execution. NOTE: The developer disputes this as a vulnerability, indicating that rpcd functions appropriately |
Information
Published : 2018-06-19 21:29
Updated : 2024-11-21 03:42
NVD link : CVE-2018-11116
Mitre link : CVE-2018-11116
CVE.ORG link : CVE-2018-11116
JSON object : View
Products Affected
openwrt
- openwrt
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource