CVE-2018-1000093

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-1000093
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-1000093.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2018-1000093
Published
2018-03-13T15:29:01Z
Modified
2025-01-08T04:53:02.491515Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

CryptoNote version version 0.8.9 and possibly later contain a local RPC server which does not require authentication, as a result the walletd and the simplewallet RPC daemons will process any commands sent to them, resulting in remote command execution and a takeover of the cryptocurrency wallet if an attacker can trick an application such as a web browser into connecting and sending a command for example. This attack appears to be exploitable via a victim visiting a webpage hosting malicious content that trigger such behavior.

References

Affected packages

Git / github.com/cryptonotefoundation/cryptonote

Affected ranges

Type
GIT
Repo
https://github.com/cryptonotefoundation/cryptonote
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v0.*

v0.8.9