CVE-2016-6342

Published on: 06/27/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:11 PM UTC

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Certain versions of Elog from Elog Project contain the following vulnerability:

elog 3.1.1 allows remote attackers to post data as any username in the logbook.

  • CVE-2016-6342 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE HIGH NONE

CVSS2 Score: 5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE PARTIAL NONE

CVE References

Description Tags Link
1371328 – (CVE-2016-6342) CVE-2016-6342 elog: posting entry as arbitrary username by improper authentication Issue Tracking
bugzilla.redhat.com
text/html
URL Logo CONFIRM bugzilla.redhat.com/show_bug.cgi?id=1371328
[SECURITY] Fedora 25 Update: elog-3.1.1-7.fc25 - package-announce - Fedora Mailing-Lists Third Party Advisory
lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2016-348a7b6285

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationElog ProjectElog3.1.1AllAllAll
ApplicationElog ProjectElog3.1.1AllAllAll
Operating
System
FedoraprojectFedora24AllAllAll
Operating
System
FedoraprojectFedora24AllAllAll
  • cpe:2.3:a:elog_project:elog:3.1.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:elog_project:elog:3.1.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*:
  • cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*: