First published: Fri Jun 22 2018(Updated: )
Portainer before 1.18.0 supports unauthenticated requests to the websocket endpoint with an unvalidated id query parameter for the /websocket/exec endpoint, which allows remote attackers to bypass intended access restrictions or conduct SSRF attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Portainer Portainer | <1.18.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-12678 is a vulnerability in Portainer before version 1.18.0 that allows unauthenticated requests to the websocket endpoint, potentially leading to access bypass or SSRF attacks.
CVE-2018-12678 has a severity level of critical with a CVSS score of 9.8.
CVE-2018-12678 affects Portainer versions up to and excluding 1.18.0.
The Common Weakness Enumeration (CWE) ID associated with CVE-2018-12678 is CWE-918.
To fix CVE-2018-12678 in Portainer, upgrade to version 1.18.0 or newer.