First published: Fri Jul 28 2017(Updated: )
The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/supervisor | <3.3.3 | 3.3.3 |
pip/supervisor | >=3.3.0<3.3.3 | 3.3.3 |
pip/supervisor | >=3.2.0<3.2.4 | 3.2.4 |
pip/supervisor | >=3.1.0<3.1.4 | 3.1.4 |
pip/supervisor | <3.0.1 | 3.0.1 |
supervisord | <=3.0 | |
supervisord | =3.1.0 | |
supervisord | =3.1.1 | |
supervisord | =3.1.2 | |
supervisord | =3.1.3 | |
supervisord | =3.2.0 | |
supervisord | =3.2.1 | |
supervisord | =3.2.2 | |
supervisord | =3.2.3 | |
supervisord | =3.3.0 | |
supervisord | =3.3.1 | |
supervisord | =3.3.2 | |
Fedora | =24 | |
Fedora | =25 | |
Fedora | =26 | |
Debian | =8.0 | |
Debian | =9.0 | |
Red Hat CloudForms | =4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11610 is classified as a moderate severity vulnerability.
To fix CVE-2017-11610, upgrade to supervisor version 3.3.3 or higher.
CVE-2017-11610 affects supervisor versions prior to 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3.
Yes, CVE-2017-11610 can be exploited by remote authenticated users to execute arbitrary commands.
CVE-2017-11610 impacts systems using affected versions of the supervisor package, including those from Red Hat and Debian.