CVE-2019-11076

Cribl UI 1.5.0 allows remote attackers to run arbitrary commands via an unauthenticated web request.
References
Link Resource
https://docs.cribl.io/blog/release-v151 Release Notes Vendor Advisory
https://github.com/livehybrid/poc-cribl-rce Exploit Third Party Advisory
https://docs.cribl.io/blog/release-v151 Release Notes Vendor Advisory
https://github.com/livehybrid/poc-cribl-rce Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:cribl:cribl:1.5.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:20

Type Values Removed Values Added
References () https://docs.cribl.io/blog/release-v151 - Release Notes, Vendor Advisory () https://docs.cribl.io/blog/release-v151 - Release Notes, Vendor Advisory
References () https://github.com/livehybrid/poc-cribl-rce - Exploit, Third Party Advisory () https://github.com/livehybrid/poc-cribl-rce - Exploit, Third Party Advisory

Information

Published : 2019-04-23 18:29

Updated : 2024-11-21 04:20


NVD link : CVE-2019-11076

Mitre link : CVE-2019-11076

CVE.ORG link : CVE-2019-11076


JSON object : View

Products Affected

cribl

  • cribl
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')