Astaro Security Gateway prior 2012/02/11 Whitelist privileges management
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.1 | $0-$5k | 0.00 |
Summary
A vulnerability marked as problematic has been reported in Astaro Security Gateway. Affected by this vulnerability is an unknown functionality of the component Whitelist. The manipulation leads to privileges management. Additionally, an exploit exists. It is suggested to upgrade the affected component.
Details
A vulnerability was found in Astaro Security Gateway and classified as critical. This issue affects an unknown code of the component Whitelist. The manipulation with an unknown input leads to a privileges management vulnerability. Using CWE to declare the problem leads to CWE-269. The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. Impacted is confidentiality, and integrity.
The weakness was released 02/11/2012 as File 109675/UPS (Packetstorm). It is possible to read the advisory at packetstormsecurity.org. The attack needs to be initiated within the local network. No form of authentication is needed for a successful exploitation. Technical details are unknown but a public exploit is available. The attack technique deployed by this issue is T1068 according to MITRE ATT&CK.
It is declared as proof-of-concept. By approaching the search of intitle:WebAdmin "Astaro GmbH" it is possible to find vulnerable targets with Google Hacking.
Upgrading to version 2012, 02 or 11 eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (73145), SecurityFocus (BID 51969†) and OSVDB (79142†). Be aware that VulDB is the high quality source for vulnerability data.
Product
Vendor
Name
CPE 2.3
CPE 2.2
Screenshot

CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 8.1VulDB Meta Temp Score: 7.1
VulDB Base Score: 8.1
VulDB Temp Score: 7.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Privileges managementCWE: CWE-269 / CWE-266
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Partially
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Google Hack: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Security Gateway 2012/02/11
Timeline
02/10/2012 🔍02/11/2012 🔍
02/24/2012 🔍
04/25/2018 🔍
Sources
Advisory: File 109675/UPSStatus: Confirmed
GCVE (VulDB): GCVE-100-4631
X-Force: 73145 - Astaro Security Gateway whitelist security bypass, Medium Risk
SecurityFocus: 51969
OSVDB: 79142
Entry
Created: 02/24/2012 01:00Updated: 04/25/2018 12:02
Changes: 02/24/2012 01:00 (47), 04/25/2018 12:02 (2)
Complete: 🔍
Cache ID: 216:8BC:103
Be aware that VulDB is the high quality source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.