CVE-2019-16286 (GCVE-0-2019-16286)
Vulnerability from cvelistv5
Published
2019-11-22 21:49
Modified
2024-08-05 01:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Application filter bypass and arbitrary command execution.
Summary
An attacker may be able to bypass the OS application filter meant to restrict applications that can be executed by changing browser preferences to launch a separate process that in turn can execute arbitrary commands.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
HP | ThinPro Linux |
Version: 6.2 Version: 6.2.1 Version: 7.0 Version: 7.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:10:41.697Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hp.com/us-en/document/c06509350" }, { "name": "20200324 HP ThinPro - Application filter bypass", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2020/Mar/37" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/156898/HP-ThinPro-6.x-7.x-Filter-Bypass.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ThinPro Linux", "vendor": "HP", "versions": [ { "status": "affected", "version": "6.2" }, { "status": "affected", "version": "6.2.1" }, { "status": "affected", "version": "7.0" }, { "status": "affected", "version": "7.1" } ] } ], "descriptions": [ { "lang": "en", "value": "An attacker may be able to bypass the OS application filter meant to restrict applications that can be executed by changing browser preferences to launch a separate process that in turn can execute arbitrary commands." } ], "problemTypes": [ { "descriptions": [ { "description": "Application filter bypass and arbitrary command execution.", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-25T16:06:11", "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "shortName": "hp" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hp.com/us-en/document/c06509350" }, { "name": "20200324 HP ThinPro - Application filter bypass", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2020/Mar/37" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/156898/HP-ThinPro-6.x-7.x-Filter-Bypass.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "hp-security-alert@hp.com", "ID": "CVE-2019-16286", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ThinPro Linux", "version": { "version_data": [ { "version_value": "6.2" }, { "version_value": "6.2.1" }, { "version_value": "7.0" }, { "version_value": "7.1" } ] } } ] }, "vendor_name": "HP" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An attacker may be able to bypass the OS application filter meant to restrict applications that can be executed by changing browser preferences to launch a separate process that in turn can execute arbitrary commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Application filter bypass and arbitrary command execution." } ] } ] }, "references": { "reference_data": [ { "name": "https://support.hp.com/us-en/document/c06509350", "refsource": "CONFIRM", "url": "https://support.hp.com/us-en/document/c06509350" }, { "name": "20200324 HP ThinPro - Application filter bypass", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2020/Mar/37" }, { "name": "http://packetstormsecurity.com/files/156898/HP-ThinPro-6.x-7.x-Filter-Bypass.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/156898/HP-ThinPro-6.x-7.x-Filter-Bypass.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "assignerShortName": "hp", "cveId": "CVE-2019-16286", "datePublished": "2019-11-22T21:49:18", "dateReserved": "2019-09-13T00:00:00", "dateUpdated": "2024-08-05T01:10:41.697Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-16286\",\"sourceIdentifier\":\"hp-security-alert@hp.com\",\"published\":\"2019-11-22T22:15:11.187\",\"lastModified\":\"2024-11-21T04:30:27.633\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An attacker may be able to bypass the OS application filter meant to restrict applications that can be executed by changing browser preferences to launch a separate process that in turn can execute arbitrary commands.\"},{\"lang\":\"es\",\"value\":\"Un atacante puede ser capaz de omitir el filtro de aplicaci\u00f3n del sistema operativo destinado a restringir las aplicaciones que pueden ser ejecutadas mediante el cambio de las preferencias del navegador para iniciar un proceso separado que a su vez puede ejecutar comandos arbitrarios.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:thinpro_linux:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6059DA4F-17DB-4837-9017-3491FD089356\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:thinpro_linux:6.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"185A85FB-69BF-470B-A701-876F2622213A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:thinpro_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"357F499E-ED43-4612-9D8A-DC9B7B32C7D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:thinpro_linux:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24BB4C78-3C43-49C7-9C32-98894031C527\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/156898/HP-ThinPro-6.x-7.x-Filter-Bypass.html\",\"source\":\"hp-security-alert@hp.com\"},{\"url\":\"http://seclists.org/fulldisclosure/2020/Mar/37\",\"source\":\"hp-security-alert@hp.com\"},{\"url\":\"https://support.hp.com/us-en/document/c06509350\",\"source\":\"hp-security-alert@hp.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/156898/HP-ThinPro-6.x-7.x-Filter-Bypass.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/fulldisclosure/2020/Mar/37\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.hp.com/us-en/document/c06509350\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…