Description
A log poisoning vulnerability has been discovered in the OneShield Policy (Dragon Core) framework before 5.1.10. Authenticated remote adversaries can poison log files by entering malicious payloads in either headers or form elements. These payloads are then executed via a client side debugging console. This is predicated on the debugging console and Java Bean being made available to the deployed application.
Published: 2019-05-08
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-3312 A log poisoning vulnerability has been discovered in the OneShield Policy (Dragon Core) framework before 5.1.10. Authenticated remote adversaries can poison log files by entering malicious payloads in either headers or form elements. These payloads are then executed via a client side debugging console. This is predicated on the debugging console and Java Bean being made available to the deployed application.
History

No history.

Subscriptions

Oneshield Oneshield Policy
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T23:03:31.509Z

Reserved: 2019-05-01T00:00:00.000Z

Link: CVE-2019-11642

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-05-08T16:29:00.550

Modified: 2024-11-21T04:21:30.960

Link: CVE-2019-11642

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses