First published: Tue Jan 12 2016(Updated: )
The HTTPS fallback implementation in Shell In A Box (aka shellinabox) before 2.19 makes it easier for remote attackers to conduct DNS rebinding attacks via the "/plain" URL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Fedora | =22 | |
Red Hat Fedora | =23 | |
Shellinabox | <=2.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8400 is considered a moderate severity vulnerability due to its potential exploitation in DNS rebinding attacks.
To fix CVE-2015-8400, upgrade Shell In A Box to version 2.19 or later.
CVE-2015-8400 affects Shell In A Box versions up to and including 2.18.
CVE-2015-8400 can facilitate remote DNS rebinding attacks that compromise the integrity of user sessions.
CVE-2015-8400 affects Fedora versions 22 and 23 as well as any systems running an affected version of Shell In A Box.