Vulnerability Details : CVE-2017-11319
Perspective ICM Investigation & Case 5.1.1.16 allows remote authenticated users to modify access level permissions and consequently gain privileges by leveraging insufficient validation methods and missing cross server side checking mechanisms.
Products affected by CVE-2017-11319
- cpe:2.3:a:resolver:perspective:5.1.1.16:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-11319
1.26%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 84 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-11319
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2017-11319
-
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-11319
-
http://packetstormsecurity.com/files/145230/Perspective-ICM-Investigation-And-Case-5.1.1.16-Privilege-Escalation.html
Perspective ICM Investigation And Case 5.1.1.16 Privilege Escalation ≈ Packet StormIssue Tracking;Third Party Advisory;VDB Entry
-
https://www.exploit-db.com/exploits/43210/
Perspective ICM Investigation & Case 5.1.1.16 - Privilege EscalationIssue Tracking;Third Party Advisory;VDB Entry
Jump to