Ubiquiti EdgeMAX devices before 2.0.3 allow remote attackers to cause a denial of service (disk consumption) because *.cache files in /var/run/beaker/container_file/ are created when providing a valid length payload of 249 characters or fewer to the beaker.session.id cookie in a GET header. The attacker can use a long series of unique session IDs.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T01:24:48.289Z
Reserved: 2019-09-25T00:00:00
Link: CVE-2019-16889
No data.
Status : Modified
Published: 2019-09-25T20:15:11.120
Modified: 2024-11-21T04:31:16.817
Link: CVE-2019-16889
No data.
OpenCVE Enrichment
No data.
Weaknesses