Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wvh4-6wwm-47c4

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

SalesLogix 6.1 does not verify if a user is authenticated before performing sensitive operations, which could allow remote attackers to (1) execute arbitrary SLX commands on the server or spoof the server via a man-in-the-middle (MITM) attack, or (2) obtain the database password via a GetConnection request to TCP port 1707.

SalesLogix 6.1 does not verify if a user is authenticated before performing sensitive operations, which could allow remote attackers to (1) execute arbitrary SLX commands on the server or spoof the server via a man-in-the-middle (MITM) attack, or (2) obtain the database password via a GetConnection request to TCP port 1707.

EPSS

Процентиль: 81%
0.01495
Низкий

Связанные уязвимости

nvd
больше 21 года назад

SalesLogix 6.1 does not verify if a user is authenticated before performing sensitive operations, which could allow remote attackers to (1) execute arbitrary SLX commands on the server or spoof the server via a man-in-the-middle (MITM) attack, or (2) obtain the database password via a GetConnection request to TCP port 1707.

EPSS

Процентиль: 81%
0.01495
Низкий