{"api_version":"1","generated_at":"2026-04-24T20:51:48+00:00","cve":"CVE-2015-3163","urls":{"html":"https://cve.report/CVE-2015-3163","api":"https://cve.report/api/cve/CVE-2015-3163.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2015-3163","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2015-3163"},"summary":{"title":"CVE-2015-3163","description":"The admin pages for power types and key types in Beaker before 20.1 do not have any access controls, which allows remote authenticated users to modify power types and key types via navigating to $BEAKER/powertypes and $BEAKER/keytypes respectively.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2017-09-06 21:29:00","updated_at":"2020-03-09 18:39:00"},"problem_types":["CWE-284"],"metrics":[],"references":[{"url":"http://www.securityfocus.com/bid/74567","name":"74567","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"Beaker CVE-2015-3163 Security Bypass Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1215034","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1215034","refsource":"CONFIRM","tags":["Exploit","Issue Tracking","Patch","Third Party Advisory","VDB Entry"],"title":"1215034 – (CVE-2015-3163) anonymous users can modify key types and power types","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://beaker-project.org/jenkins-results/beaker-review-checks-docs/995/documentation/_build/html/whats-new/release-20.html","name":"https://beaker-project.org/jenkins-results/beaker-review-checks-docs/995/documentation/_build/html/whats-new/release-20.html","refsource":"CONFIRM","tags":["Release Notes","Vendor Advisory"],"title":"404 Not Found","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2015/05/08/1","name":"[oss-security] 20150507 beaker vulns fixed in version 20.1","refsource":"MLIST","tags":["Mailing List","Third Party Advisory"],"title":"oss-security - beaker vulns fixed in version 20.1","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2015-3163","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-3163","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2015","cve_id":"3163","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"beaker","cpe6":"20.0","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"3163","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"beaker","cpe6":"20.0","cpe7":"rc1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"3163","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"beaker","cpe6":"20.0","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"3163","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"beaker","cpe6":"20.0","cpe7":"rc1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"3163","vulnerable":"1","versionEndIncluding":"19.3","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"beaker","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"secalert@redhat.com","ID":"CVE-2015-3163","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The admin pages for power types and key types in Beaker before 20.1 do not have any access controls, which allows remote authenticated users to modify power types and key types via navigating to $BEAKER/powertypes and $BEAKER/keytypes respectively."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"[oss-security] 20150507 beaker vulns fixed in version 20.1","refsource":"MLIST","url":"http://www.openwall.com/lists/oss-security/2015/05/08/1"},{"name":"https://beaker-project.org/jenkins-results/beaker-review-checks-docs/995/documentation/_build/html/whats-new/release-20.html","refsource":"CONFIRM","url":"https://beaker-project.org/jenkins-results/beaker-review-checks-docs/995/documentation/_build/html/whats-new/release-20.html"},{"name":"https://bugzilla.redhat.com/show_bug.cgi?id=1215034","refsource":"CONFIRM","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1215034"},{"name":"74567","refsource":"BID","url":"http://www.securityfocus.com/bid/74567"}]}},"nvd":{"publishedDate":"2017-09-06 21:29:00","lastModifiedDate":"2020-03-09 18:39:00","problem_types":["CWE-284"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":4},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":2.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:beaker:*:*:*:*:*:*:*:*","versionEndIncluding":"19.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:beaker:20.0:-:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:beaker:20.0:rc1:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2015","CveId":"3163","Ordinal":"80116","Title":"CVE-2015-3163","CVE":"CVE-2015-3163","Year":"2015"},"notes":[{"CveYear":"2015","CveId":"3163","Ordinal":"1","NoteData":"The admin pages for power types and key types in Beaker before 20.1 do not have any access controls, which allows remote authenticated users to modify power types and key types via navigating to $BEAKER/powertypes and $BEAKER/keytypes respectively.","Type":"Description","Title":null},{"CveYear":"2015","CveId":"3163","Ordinal":"2","NoteData":"2017-09-06","Type":"Other","Title":"Published"},{"CveYear":"2015","CveId":"3163","Ordinal":"3","NoteData":"2017-09-06","Type":"Other","Title":"Modified"}]}}}