HIGH7.4
The HTTPS fallback implementation in Shell In A Box (aka shellinabox) before 2.19 makes it easier for remote attackers to conduct DNS rebinding attacks via the "/plain" URL.
CVSS 2.0MEDIUM 4.3
CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:NCVSS 3.xHIGH 7.4
CVSS:3.x/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:NReferences
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175117.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175224.html
- http://www.openwall.com/lists/oss-security/2015/12/02/6
- http://www.openwall.com/lists/oss-security/2015/12/02/7
- https://github.com/shellinabox/shellinabox/issues/355
- https://github.com/shellinabox/shellinabox/releases/tag/v2.19
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175117.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175224.html
- http://www.openwall.com/lists/oss-security/2015/12/02/6
- http://www.openwall.com/lists/oss-security/2015/12/02/7
- https://github.com/shellinabox/shellinabox/issues/355
- https://github.com/shellinabox/shellinabox/releases/tag/v2.19