Very Low
CVE-2009-2936
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Very Low
(1 user assessed)Moderate
(1 user assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
The Command Line Interface (aka Server CLI or administration interface) in the master process in the reverse proxy server in Varnish before 2.1.0 does not require authentication for commands received through a TCP port, which allows remote attackers to (1) execute arbitrary code via a vcl.inline directive that provides a VCL configuration file containing inline C code; (2) change the ownership of the master process via param.set, stop, and start directives; (3) read the initial line of an arbitrary file via a vcl.load directive; or (4) conduct cross-site request forgery (CSRF) attacks that leverage a victim’s location on a trusted network and improper input validation of directives. NOTE: the vendor disputes this report, saying that it is “fundamentally misguided and pointless.
Add Assessment
Ratings
-
Attacker ValueVery Low
-
ExploitabilityMedium
Technical Analysis
The (3) part of this does seem to be true, using vcl.load
and supplying it a file will attempt to load the file. Because the file is most likely NOT a vcl
file, the file will fail to load, however the error message echoed back to the user includes the first line of the file.
While you are able to read an arbitrary file, you’ll only get the first line, YMMV. The process is most likely also not running as root, so /etc/shadow
where the first line would be great most likely won’t happen.
Would you also like to delete your Exploited in the Wild Report?
Delete Assessment Only Delete Assessment and Exploited in the Wild ReportCVSS V3 Severity and Metrics
General Information
Vendors
- varnish.projects.linpro
Products
- varnish 0.9,
- varnish 0.9.1,
- varnish 1.0,
- varnish 1.0.1,
- varnish 1.0.2,
- varnish 1.0.3,
- varnish 1.0.4,
- varnish 1.1,
- varnish 1.1.1,
- varnish 1.1.2,
- varnish 2.0,
- varnish 2.0.1,
- varnish 2.0.2,
- varnish 2.0.3,
- varnish 2.0.4,
- varnish 2.0.5,
- varnish 2.0.6
Metasploit Modules
References
Advisory
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: