Search for vulnerabilities
Vulnerability details: VCID-bvwx-zvrz-n7fd
Vulnerability ID VCID-bvwx-zvrz-n7fd
Aliases CVE-2009-2936
Summary The Command Line Interface (aka Server CLI or administration interface) in the master process in the reverse proxy server in Varnish before 2.1.0 does not require authentication for commands received through a TCP port, which allows remote attackers to (1) execute arbitrary code via a vcl.inline directive that provides a VCL configuration file containing inline C code; (2) change the ownership of the master process via param.set, stop, and start directives; (3) read the initial line of an arbitrary file via a vcl.load directive; or (4) conduct cross-site request forgery (CSRF) attacks that leverage a victim's location on a trusted network and improper input validation of directives. NOTE: the vendor disputes this report, saying that it is "fundamentally misguided and pointless.
Status Published
Exploitability 2.0
Weighted Severity 0.6
Risk 1.2
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
Data source Exploit-DB
Date added Dec. 19, 2014
Description Varnish Cache CLI Interface - Remote Code Execution (Metasploit)
Ransomware campaign use Unknown
Source publication date Dec. 19, 2014
Exploit type remote
Platform linux
Source update date Dec. 19, 2014
Data source Metasploit
Description This module attempts to login to the Varnish Cache (varnishd) CLI instance using a bruteforce list of passwords.
Note
{}
Ransomware campaign use Unknown
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/scanner/varnish/varnish_cli_login.rb
There are no known vectors.
Exploit Prediction Scoring System (EPSS)
Percentile 0.98495
EPSS Score 0.6839
Published At June 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-01T13:55:32.547800+00:00 Debian Importer Import https://security-tracker.debian.org/tracker/data/json 36.1.3