Vulnerability Details : CVE-2018-1000132
Mercurial version 4.5 and earlier contains a Incorrect Access Control (CWE-285) vulnerability in Protocol server that can result in Unauthorized data access. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in 4.5.1.
Exploit prediction scoring system (EPSS) score for CVE-2018-1000132
Probability of exploitation activity in the next 30 days: 0.29%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 66 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2018-1000132
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:P/A:N |
10.0
|
4.9
|
NIST |
9.1
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
3.9
|
5.2
|
NIST |
CWE ids for CVE-2018-1000132
-
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-1000132
-
https://access.redhat.com/errata/RHSA-2019:2276
RHSA-2019:2276 - Security Advisory - Red Hat Customer Portal
-
https://lists.debian.org/debian-lts-announce/2020/07/msg00032.html
[SECURITY] [DLA 2293-1] mercurial security update
-
https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.5.1_.2F_4.5.2_.282018-03-06.29
WhatsNew - MercurialRelease Notes;Vendor Advisory
-
https://lists.debian.org/debian-lts-announce/2018/03/msg00034.html
[SECURITY] [DLA 1331-1] mercurial security updateMailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2018/07/msg00005.html
[SECURITY] [DLA 1414-1] mercurial security updateMailing List;Third Party Advisory
Products affected by CVE-2018-1000132
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:mercurial:mercurial:*:*:*:*:*:*:*:*