Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cwjr-66gj-xm4q

Опубликовано: 10 июн. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 8.8

Описание

The ITarian platform (SAAS / on-premise) offers the possibility to run code on agents via a function called procedures. It is possible to require a mandatory approval process. Due to a vulnerability in the approval process, present in any version prior to 6.35.37347.20040, a malicious actor (with a valid session token) can create a procedure, bypass approval, and execute the procedure. This results in the ability for any user with a valid session token to perform arbitrary code execution and full system take-over on all agents.

The ITarian platform (SAAS / on-premise) offers the possibility to run code on agents via a function called procedures. It is possible to require a mandatory approval process. Due to a vulnerability in the approval process, present in any version prior to 6.35.37347.20040, a malicious actor (with a valid session token) can create a procedure, bypass approval, and execute the procedure. This results in the ability for any user with a valid session token to perform arbitrary code execution and full system take-over on all agents.

EPSS

Процентиль: 63%
0.00449
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 9.9
nvd
больше 3 лет назад

The ITarian platform (SAAS / on-premise) offers the possibility to run code on agents via a function called procedures. It is possible to require a mandatory approval process. Due to a vulnerability in the approval process, present in any version prior to 6.35.37347.20040, a malicious actor (with a valid session token) can create a procedure, bypass approval, and execute the procedure. This results in the ability for any user with a valid session token to perform arbitrary code execution and full system take-over on all agents.

EPSS

Процентиль: 63%
0.00449
Низкий

8.8 High

CVSS3