CVE-2018-14055

ZNC before 1.7.1-rc1 does not properly validate untrusted lines coming from the network, allowing a non-admin user to escalate his privilege and inject rogue values into znc.conf.
Configurations

Configuration 1 (hide)

cpe:2.3:a:znc:znc:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:48

Type Values Removed Values Added
References () https://github.com/znc/znc/commit/a7bfbd93812950b7444841431e8e297e62cb524e - Patch, Third Party Advisory () https://github.com/znc/znc/commit/a7bfbd93812950b7444841431e8e297e62cb524e - Patch, Third Party Advisory
References () https://github.com/znc/znc/commit/d22fef8620cdd87490754f607e7153979731c69d - Patch, Third Party Advisory () https://github.com/znc/znc/commit/d22fef8620cdd87490754f607e7153979731c69d - Patch, Third Party Advisory
References () https://security.gentoo.org/glsa/201807-03 - Third Party Advisory () https://security.gentoo.org/glsa/201807-03 - Third Party Advisory
References () https://www.debian.org/security/2018/dsa-4252 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4252 - Third Party Advisory

Information

Published : 2018-07-15 01:29

Updated : 2024-11-21 03:48


NVD link : CVE-2018-14055

Mitre link : CVE-2018-14055

CVE.ORG link : CVE-2018-14055


JSON object : View

Products Affected

debian

  • debian_linux

znc

  • znc
CWE
CWE-20

Improper Input Validation