OpenWrt mishandles access control in /etc/config/rpcd and the /usr/share/rpcd/acl.d files, which allows remote authenticated users to call arbitrary methods (i.e., achieve ubus access over HTTP) that were only supposed to be accessible to a specific user, as demonstrated by the file, log, and service namespaces, potentially leading to remote Information Disclosure or Code Execution. NOTE: The developer disputes this as a vulnerability, indicating that rpcd functions appropriately
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T07:54:36.564Z
Reserved: 2018-05-15T00:00:00
Link: CVE-2018-11116
Updated: 2024-08-05T07:54:36.564Z
Status : Modified
Published: 2018-06-19T21:29:00.333
Modified: 2024-11-21T03:42:41.587
Link: CVE-2018-11116
No data.
OpenCVE Enrichment
No data.
Weaknesses