CVE-2018-5955
GitStack Authentication Bypass
Description
An issue was discovered in GitStack through 2.3.10. User controlled input is not sufficiently filtered, allowing an unauthenticated attacker to add a user to the server via the username and password fields to the rest/user/ URI.
INFO
Published Date :
Jan. 21, 2018, 10:29 p.m.
Last Modified :
March 6, 2019, 5:27 p.m.
Source :
[email protected]
Remotely Exploitable :
Yes !
Impact Score :
5.9
Exploitability Score :
3.9
Public PoC/Exploit Available at Github
CVE-2018-5955 has a 15 public PoC/Exploit
available at Github.
Go to the Public Exploits
tab to see the list.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2018-5955
.
URL | Resource |
---|---|
https://blogs.securiteam.com/index.php/archives/3557 | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/44356/ | Exploit Third Party Advisory VDB Entry |
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
An exploit for CVE-2018-5955 GitStack 2.3.10 Unauthenticated RCE
cve exploit php vulnerabilities cve-2018-5955 gitstack hacking web-application web-hacking
Python
A write up of a pen test of the Wreath Network on TryHackMe
None
Python
None
None
Python
None
Python
None
None
None
Python
None
自研威胁分析框架
Python
None
GitStack Unauthenticated Remote Code Execution exploit PoC with interactive shell
Python
一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能
hacking-tool sql-injection xss waf proxy middleware ssrf penetration-testing security-tools websecurity python bypass
Python
GitStackRCE漏洞(CVE-2018-5955)EXP
Python
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2018-5955
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2018-5955
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Modified by [email protected]
May. 14, 2024
Action Type Old Value New Value -
Modified Analysis by [email protected]
Mar. 06, 2019
Action Type Old Value New Value Changed Reference Type https://www.exploit-db.com/exploits/44356/ No Types Assigned https://www.exploit-db.com/exploits/44356/ Exploit, Third Party Advisory, VDB Entry -
CVE Modified by [email protected]
Apr. 01, 2018
Action Type Old Value New Value Added Reference https://www.exploit-db.com/exploits/44356/ [No Types Assigned] -
Initial Analysis by [email protected]
Feb. 08, 2018
Action Type Old Value New Value Added CVSS V2 (AV:N/AC:L/Au:N/C:P/I:P/A:P) Added CVSS V3 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Changed Reference Type https://blogs.securiteam.com/index.php/archives/3557 No Types Assigned https://blogs.securiteam.com/index.php/archives/3557 Exploit, Third Party Advisory Added CWE CWE-20 Added CPE Configuration OR *cpe:2.3:a:smartmobilesoftware:gitstack:*:*:*:*:*:*:*:* versions up to (including) 2.3.10
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2018-5955
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2018-5955
weaknesses.
Exploit Prediction
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.
96.36 }} -0.04%
score
0.99319
percentile