Published on July 7th, 2019 📆 | 3272 Views ⚑0
SWIFT Alliance Web Platform 7.1.23 Log PATH_INFO privilege escalation
|CVSS Meta Temp Score||Current Exploit Price (≈)|
A vulnerability classified as problematic was found in SWIFT Alliance Web Platform 7.1.23. This vulnerability affects an unknown functionality of the file swp/login/EJBRemoteService/ of the component Log Handler. The manipulation of the argument
PATH_INFO as part of a Error Message leads to a privilege escalation vulnerability (Injection). The CWE definition for the vulnerability is CWE-269. As an impact it is known to affect confidentiality, integrity, and availability.
The weakness was shared 07/05/2019. This vulnerability was named CVE-2018-16386 since 09/02/2018. There are known technical details, but no exploit is available. The current price for an exploit might be approx. USD $0-$5k (estimation calculated on 07/06/2019).
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.5
Status: Not defined
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day Time: 🔒
09/02/2018 CVE assigned See the underground prices here!
07/05/2019 +306 days Advisory disclosed
07/06/2019 +1 days VulDB entry created
07/06/2019 +0 days VulDB last update
CVE: CVE-2018-16386 (🔒)Created: 07/06/2019 08:49 AM
See the underground prices here!