Vulnerability Description
VDG Security SENSE (formerly DIVA) before 2.3.15 allows remote attackers to bypass authentication, and consequently read and modify arbitrary plugin settings, via an encoded : (colon) character in the Authorization HTTP header.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vdgsecurity | Vdg Sense | <= 2.3.14 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-DisclExploit
- http://seclists.org/fulldisclosure/2014/Dec/76Exploit
- https://vdgsecurity.com/downloads/software/?file=1.+DIVA+2.3%2F2.+Changelog+2.3.Vendor Advisory
- https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141218-Exploit
- http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-DisclExploit
- http://seclists.org/fulldisclosure/2014/Dec/76Exploit
- https://vdgsecurity.com/downloads/software/?file=1.+DIVA+2.3%2F2.+Changelog+2.3.Vendor Advisory
- https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141218-Exploit
FAQ
What is CVE-2014-9575?
CVE-2014-9575 is a vulnerability with a CVSS score of 6.4 (MEDIUM). VDG Security SENSE (formerly DIVA) before 2.3.15 allows remote attackers to bypass authentication, and consequently read and modify arbitrary plugin settings, via an encoded : (colon) character in the...
How severe is CVE-2014-9575?
CVE-2014-9575 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-9575?
Check the references section above for vendor advisories and patch information. Affected products include: Vdgsecurity Vdg Sense.