CVE-2009-2936

high

Description

The Command Line Interface (aka Server CLI or administration interface) in the master process in the reverse proxy server in Varnish before 2.1.0 does not require authentication for commands received through a TCP port, which allows remote attackers to (1) execute arbitrary code via a vcl.inline directive that provides a VCL configuration file containing inline C code; (2) change the ownership of the master process via param.set, stop, and start directives; (3) read the initial line of an arbitrary file via a vcl.load directive; or (4) conduct cross-site request forgery (CSRF) attacks that leverage a victim's location on a trusted network and improper input validation of directives. NOTE: the vendor disputes this report, saying that it is "fundamentally misguided and pointless.

References

http://www.varnish-cache.org/wiki/CLI

http://www.varnish-cache.org/changeset/3865

http://www.securityfocus.com/archive/1/510368/100/0/threaded

http://www.securityfocus.com/archive/1/510360/100/0/threaded

http://lists.fedoraproject.org/pipermail/package-announce/2010-April/040359.html

Details

Source: Mitre, NVD

Published: 2010-04-05

Updated: 2024-04-11

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Severity: High