CVE-2018-9843
Severity CVSS v4.0:
Pending analysis
Type:
CWE-502
Deserialization of Untrusted Dat
Publication date:
12/04/2018
Last modified:
27/02/2019
Description
The REST API in CyberArk Password Vault Web Access before 9.9.5 and 10.x before 10.1 allows remote attackers to execute arbitrary code via a serialized .NET object in an Authorization HTTP header.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cyberark:password_vault:*:*:*:*:*:*:*:* | 9.9.5 (excluding) | |
| cpe:2.3:a:cyberark:password_vault:*:*:*:*:*:*:*:* | 10.0 (including) | 10.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://seclists.org/fulldisclosure/2018/Apr/18
- http://www.securityfocus.com/archive/1/541932/100/0/threaded
- http://www.securitytracker.com/id/1040675
- https://www.exploit-db.com/exploits/44429/
- https://www.redteam-pentesting.de/en/advisories/rt-sa-2017-014/-cyberark-password-vault-web-access-remote-code-execution



