Portainer < 1.22.1 Multiple Vulnerabilities

Published: 2019-11-08 15:14:12
CVE Author: NIST National Vulnerability Database (NVD)

CVSS Base Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N

Detection Type:
Remote Banner

Solution Type:
Vendor Patch

Summary:
Portainer is prone to multiple vulnerabilities.

Technical Details:
Portainer is prone to multiple vulnerabilities: - An Unrestricted Host Filesystem Access vulnerability exists in Stack creation feature in Portainer. Successful exploitation of this vulnerability would allow an authenticated user to gain full permission on the host filesystem. (CVE-2019-16872) - A Stored Cross-Site Scripting vulnerability exists in the isteven-multi-select component in Portainer. Successful exploitation of this vulnerability would allow authenticated users to inject arbitrary Javascript into Portainer pages viewed by other users. (CVE-2019-16873) - An Improper Access Control vulnerability exists in the RBAC extension in Portainer. Successful exploitation of this vulnerability would allow Helpdesk users to access sensitive information via the volume browsing feature. (CVE-2019-16874) - A path traversal vulnerability exists in Portainer. Successful exploitation of this vulnerability would allow an authenticated user to upload files to an arbitrary location. (CVE-2019-16876) - An authorization bypass vulnerability exists in Portainer. Successful exploitation of this vulnerability would allow an authenticated user to gain full permission on a host filesystem via the Host Management API. (CVE-2019-16877) - A Stored Cross-Site Scripting vulnerability exists in the file removal confirmation modal in Portainer. Successful exploitation of this vulnerability would allow an authenticated user to inject arbitrary Javascript into Portainer pages viewed by other users. (CVE-2019-16878)

Detection Method:
Checks if a vulnerable version is present on the target host.

Affected Versions:
Portainer versions before 1.22.1.

Recommendations:
Update to Portainer 1.22.1 or later.

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2019-16872
https://nvd.nist.gov/vuln/detail/CVE-2019-16873
https://nvd.nist.gov/vuln/detail/CVE-2019-16874
https://nvd.nist.gov/vuln/detail/CVE-2019-16876
https://nvd.nist.gov/vuln/detail/CVE-2019-16877
https://nvd.nist.gov/vuln/detail/CVE-2019-16878

Search
Severity
Medium
CVSS Score
5.0

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.