Vulnerability Description
An exploitable vulnerability exists in the safe browsing function of the CUJO Smart Firewall, version 7003. The flaw lies in the way the safe browsing function parses HTTP requests. The server hostname is extracted from captured HTTP/HTTPS requests and inserted as part of a Lua statement without prior sanitization, which results in arbitrary Lua script execution in the kernel. An attacker could send an HTTP request to exploit this vulnerability.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Getcujo | Smart Firewall | 7003 |
Related Weaknesses (CWE)
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2018-0703ExploitThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2018-0703ExploitThird Party Advisory
FAQ
What is CVE-2018-4031?
CVE-2018-4031 is a vulnerability with a CVSS score of 10.0 (CRITICAL). An exploitable vulnerability exists in the safe browsing function of the CUJO Smart Firewall, version 7003. The flaw lies in the way the safe browsing function parses HTTP requests. The server hostnam...
How severe is CVE-2018-4031?
CVE-2018-4031 has been rated CRITICAL with a CVSS base score of 10.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-4031?
Check the references section above for vendor advisories and patch information. Affected products include: Getcujo Smart Firewall.