OpenWrt mishandles access control in /etc/config/rpcd and the /usr/share/rpcd/acl.d files, which allows remote authenticated users to call arbitrary methods (i.e., achieve ubus access over HTTP) that were only supposed to be accessible to a specific user, as demonstrated by the file, log, and service namespaces, potentially leading to remote Information Disclosure or Code Execution. NOTE: The developer disputes this as a vulnerability, indicating that rpcd functions appropriately
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2018-06-19T21:00:00
Updated: 2024-08-05T07:54:36.564Z
Reserved: 2018-05-15T00:00:00
Link: CVE-2018-11116
Vulnrichment
Updated: 2024-08-05T07:54:36.564Z
NVD
Status : Modified
Published: 2018-06-19T21:29:00.333
Modified: 2024-08-05T08:15:36.933
Link: CVE-2018-11116
Redhat
No data.