CVE-2018-1000049

Nanopool Claymore Dual Miner version 7.3 and earlier contains a remote code execution vulnerability by abusing the miner API. The flaw can be exploited only if the software is executed with read/write mode enabled.
References
Link Resource
http://packetstormsecurity.com/files/147678/Nanopool-Claymore-Dual-Miner-7.3-Remote-Code-Execution.html
http://packetstormsecurity.com/files/148578/Nanopool-Claymore-Dual-Miner-APIs-Remote-Code-Execution.html
http://www.rapid7.com/db/modules/exploit/multi/misc/claymore_dual_miner_remote_manager_rce
https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2018/1000xxx/CVE-2018-1000049.json
https://reversebrain.github.io/2018/02/01/Claymore-Dual-Miner-Remote-Code-Execution
https://reversebrain.github.io/2018/02/01/Claymore-Dual-Miner-Remote-Code-Execution/ Exploit Third Party Advisory
https://twitter.com/ReverseBrain/status/951850534985662464 Third Party Advisory
https://www.exploit-db.com/exploits/44638/
https://www.exploit-db.com/exploits/45044/
http://packetstormsecurity.com/files/147678/Nanopool-Claymore-Dual-Miner-7.3-Remote-Code-Execution.html
http://packetstormsecurity.com/files/148578/Nanopool-Claymore-Dual-Miner-APIs-Remote-Code-Execution.html
http://www.rapid7.com/db/modules/exploit/multi/misc/claymore_dual_miner_remote_manager_rce
https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2018/1000xxx/CVE-2018-1000049.json
https://reversebrain.github.io/2018/02/01/Claymore-Dual-Miner-Remote-Code-Execution
https://reversebrain.github.io/2018/02/01/Claymore-Dual-Miner-Remote-Code-Execution/ Exploit Third Party Advisory
https://twitter.com/ReverseBrain/status/951850534985662464 Third Party Advisory
https://www.exploit-db.com/exploits/44638/
https://www.exploit-db.com/exploits/45044/
Configurations

Configuration 1 (hide)

cpe:2.3:a:nanopool:claymore_dual_miner:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:39

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/147678/Nanopool-Claymore-Dual-Miner-7.3-Remote-Code-Execution.html - () http://packetstormsecurity.com/files/147678/Nanopool-Claymore-Dual-Miner-7.3-Remote-Code-Execution.html -
References () http://packetstormsecurity.com/files/148578/Nanopool-Claymore-Dual-Miner-APIs-Remote-Code-Execution.html - () http://packetstormsecurity.com/files/148578/Nanopool-Claymore-Dual-Miner-APIs-Remote-Code-Execution.html -
References () http://www.rapid7.com/db/modules/exploit/multi/misc/claymore_dual_miner_remote_manager_rce - () http://www.rapid7.com/db/modules/exploit/multi/misc/claymore_dual_miner_remote_manager_rce -
References () https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2018/1000xxx/CVE-2018-1000049.json - () https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2018/1000xxx/CVE-2018-1000049.json -
References () https://reversebrain.github.io/2018/02/01/Claymore-Dual-Miner-Remote-Code-Execution - () https://reversebrain.github.io/2018/02/01/Claymore-Dual-Miner-Remote-Code-Execution -
References () https://reversebrain.github.io/2018/02/01/Claymore-Dual-Miner-Remote-Code-Execution/ - Exploit, Third Party Advisory () https://reversebrain.github.io/2018/02/01/Claymore-Dual-Miner-Remote-Code-Execution/ - Exploit, Third Party Advisory
References () https://twitter.com/ReverseBrain/status/951850534985662464 - Third Party Advisory () https://twitter.com/ReverseBrain/status/951850534985662464 - Third Party Advisory
References () https://www.exploit-db.com/exploits/44638/ - () https://www.exploit-db.com/exploits/44638/ -
References () https://www.exploit-db.com/exploits/45044/ - () https://www.exploit-db.com/exploits/45044/ -

Information

Published : 2018-02-09 23:29

Updated : 2024-11-21 03:39


NVD link : CVE-2018-1000049

Mitre link : CVE-2018-1000049

CVE.ORG link : CVE-2018-1000049


JSON object : View

Products Affected

nanopool

  • claymore_dual_miner
CWE
CWE-20

Improper Input Validation