{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2018-25087","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-06-03T09:55:28.079Z","datePublished":"2023-06-06T03:00:04.431Z","dateUpdated":"2025-01-07T21:21:30.676Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T12:40:57.504Z"},"title":"Arborator Server project.cgi start denial of service","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-404","lang":"en","description":"CWE-404 Denial of Service"}]}],"affected":[{"vendor":"Arborator","product":"Server","versions":[{"version":"n/a","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as problematic was found in Arborator Server. This vulnerability affects the function start of the file project.cgi. The manipulation of the argument project leads to denial of service. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The patch is identified as cdbdbcbd491db65e9d697ab4365605fdfab1a604. It is recommended to apply a patch to fix this issue. VDB-230662 is the identifier assigned to this vulnerability."},{"lang":"de","value":"In Arborator Server wurde eine Schwachstelle entdeckt. Sie wurde als problematisch eingestuft. Betroffen ist die Funktion start der Datei project.cgi. Durch die Manipulation des Arguments project mit unbekannten Daten kann eine denial of service-Schwachstelle ausgenutzt werden. Dieses Produkt verzichtet auf eine Versionierung und verwendet stattdessen Rolling Releases. Deshalb sind keine Details zu betroffenen oder zu aktualisierende Versionen vorhanden. Der Patch wird als cdbdbcbd491db65e9d697ab4365605fdfab1a604 bezeichnet. Als bestmögliche Massnahme wird Patching empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":2.7,"vectorString":"AV:A/AC:L/Au:S/C:N/I:N/A:P"}}],"timeline":[{"time":"2018-10-20T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2018-10-20T00:00:00.000Z","lang":"en","value":"Countermeasure disclosed"},{"time":"2023-06-03T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-06-03T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-06-30T02:18:22.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"VulDB GitHub Commit Analyzer","type":"tool"}],"references":[{"url":"https://vuldb.com/?id.230662","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.230662","tags":["signature","permissions-required"]},{"url":"https://github.com/Arborator/arborator-server/commit/cdbdbcbd491db65e9d697ab4365605fdfab1a604","tags":["patch"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T12:33:48.363Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.230662","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.230662","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/Arborator/arborator-server/commit/cdbdbcbd491db65e9d697ab4365605fdfab1a604","tags":["patch","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-07T21:21:14.624020Z","id":"CVE-2018-25087","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-07T21:21:30.676Z"}}]}}