The SOAP interface to the eMBox module in Novell eDirectory 8.7.3.9 and earlier, and 8.8.x before 8.8.2, relies on client-side authentication, which allows remote attackers to bypass authentication via requests for /SOAP URIs, and cause a denial of service (daemon shutdown) or read arbitrary files. NOTE: it was later reported that 8.7.3.10 (aka 8.7.3 SP10) is also affected.
Published 2008-03-28 18:44:00
Updated 2018-10-15 22:03:33
Source MITRE
View at NVD,   CVE.org
Vulnerability category: BypassGain privilegeDenial of service

Exploit prediction scoring system (EPSS) score for CVE-2008-0926

Probability of exploitation activity in the next 30 days: 34.62%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 97 % EPSS Score History EPSS FAQ

Metasploit modules for CVE-2008-0926

  • Novell eDirectory eMBox Unauthenticated File Access
    First seen: 2020-04-26
    auxiliary/admin/edirectory/edirectory_edirutil
    This module will access Novell eDirectory's eMBox service and can run the following actions via the SOAP interface: GET_DN, READ_LOGS, LIST_SERVICES, STOP_SERVICE, START_SERVICE, SET_LOGFILE. Authors: - Nicob - MC <mc@metasploit.com> - sinn3r <sinn3r@metasploi

CVSS scores for CVE-2008-0926

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source
7.5
HIGH AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
NIST

CWE ids for CVE-2008-0926

  • When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
    Assigned by: nvd@nist.gov (Primary)

References for CVE-2008-0926

Products affected by CVE-2008-0926

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!