Summary
Detail | |||
---|---|---|---|
Vendor | Graphite Project | First view | 2013-09-27 |
Product | Graphite | Last view | 2019-10-11 |
Version | 0.9.5 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:graphite_project:graphite |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.5 | 2019-10-11 | CVE-2017-18638 | send_email in graphite-web/webapp/graphite/composer/views.py in Graphite through 1.1.5 is vulnerable to SSRF. The vulnerable SSRF endpoint can be used by an attacker to have the Graphite web server request any resource. The response to this SSRF request is encoded into an image file and then sent to an e-mail address that can be supplied by the attacker. Thus, an attacker can exfiltrate any information. |
4.3 | 2013-09-27 | CVE-2013-5943 | Multiple cross-site scripting (XSS) vulnerabilities in Graphite before 0.9.11 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. |
6.8 | 2013-09-27 | CVE-2013-5942 | Graphite 0.9.5 through 0.9.10 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to (1) remote_storage.py, (2) storage.py, (3) render/datalib.py, and (4) whitelist/views.py, a different vulnerability than CVE-2013-5093. |
6.8 | 2013-09-27 | CVE-2013-5093 | The renderLocalView function in render/views.py in graphite-web in Graphite 0.9.5 through 0.9.10 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
66% (2) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
33% (1) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Python Pickle remote code execution attempt RuleID : 28139 - Type : SERVER-WEBAPP - Revision : 2 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2013-10-01 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_e1f99d5981aa4662bf62c1076f5016c8.nasl - Type: ACT_GATHER_INFO |
2013-09-19 | Name: The remote Fedora host is missing a security update. File: fedora_2013-15710.nasl - Type: ACT_GATHER_INFO |
2013-09-19 | Name: The remote Fedora host is missing a security update. File: fedora_2013-15713.nasl - Type: ACT_GATHER_INFO |