SWIFT Alliance Web Platform 7.1.23 Log PATH_INFO privilege escalation – Digitalmunition

Exploit Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on July 7th, 2019 📆 | 3272 Views ⚑


SWIFT Alliance Web Platform 7.1.23 Log PATH_INFO privilege escalation

CVSS Meta Temp Score Current Exploit Price (≈)
5.5 $0-$5k

A vulnerability classified as problematic was found in SWIFT Alliance Web Platform 7.1.23. This vulnerability affects an unknown functionality of the file swp/login/EJBRemoteService/ of the component Log Handler. The manipulation of the argument PATH_INFO as part of a Error Message leads to a privilege escalation vulnerability (Injection). The CWE definition for the vulnerability is CWE-269. As an impact it is known to affect confidentiality, integrity, and availability.

The weakness was shared 07/05/2019. This vulnerability was named CVE-2018-16386 since 09/02/2018. There are known technical details, but no exploit is available. The current price for an exploit might be approx. USD $0-$5k (estimation calculated on 07/06/2019).

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.



VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.5

VulDB Base Score: ≈5.5
VulDB Temp Score: ≈5.5
VulDB Vector: 🔒
VulDB Reliability: 🔍

VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Privilege escalation / Injection (CWE-269)
Local: Yes
Remote: No

Availability: 🔒
Status: Not defined

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligenceinfoedit

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍Recommended: no mitigation known

0-Day Time: 🔒

09/02/2018 CVE assigned
07/05/2019 +306 days Advisory disclosed
07/06/2019 +1 days VulDB entry created
07/06/2019 +0 days VulDB last update
CVE: CVE-2018-16386 (🔒)Created: 07/06/2019 08:49 AM
Complete: 🔍

See the underground prices here!


Tagged with:

Leave a Reply ✍