Vulnerability Description
Battelle V2I Hub 2.5.1 could allow a remote attacker to bypass security restrictions, caused by the direct checking of the API key against a user-supplied value in PHP's GET global variable array using PHP's strcmp() function. By adding "[]" to the end of "key" in the URL when accessing API functions, an attacker could exploit this vulnerability to execute API functions.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Battelle | V2I Hub | 2.5.1 |
References
- https://exchange.xforce.ibmcloud.com/vulnerabilities/147305Third Party AdvisoryVDB Entry
- https://exchange.xforce.ibmcloud.com/vulnerabilities/147305Third Party AdvisoryVDB Entry
FAQ
What is CVE-2018-1000628?
CVE-2018-1000628 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Battelle V2I Hub 2.5.1 could allow a remote attacker to bypass security restrictions, caused by the direct checking of the API key against a user-supplied value in PHP's GET global variable array usin...
How severe is CVE-2018-1000628?
CVE-2018-1000628 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-1000628?
Check the references section above for vendor advisories and patch information. Affected products include: Battelle V2I Hub.