Search
Total
4 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2018-11132 | 1 Quest | 1 Kace System Management Appliance | 2020-08-24 | 9.0 HIGH | 8.8 HIGH |
| In order to perform actions that require higher privileges, the Quest KACE System Management Appliance 8.0.318 relies on a message queue that runs daemonized with root privileges and only allows a set of commands to be executed. A command injection vulnerability exists within this message queue which allows low-privilege users to append arbitrary commands that will be run as root. | |||||
| CVE-2018-11135 | 1 Quest | 1 Kace System Management Appliance | 2020-08-24 | 6.0 MEDIUM | 7.5 HIGH |
| The script '/adminui/error_details.php' in the Quest KACE System Management Appliance 8.0.318 allows authenticated users to conduct PHP object injection attacks. | |||||
| CVE-2018-11139 | 1 Quest | 1 Kace System Management Appliance | 2019-10-03 | 9.0 HIGH | 8.8 HIGH |
| The '/common/ajax_email_connection_test.php' script in the Quest KACE System Management Appliance 8.0.318 is accessible by any authenticated user and can be abused to execute arbitrary commands on the system. This script is vulnerable to command injection via the unsanitized user input 'TEST_SERVER' sent to the script via the POST method. | |||||
| CVE-2018-11134 | 1 Quest | 1 Kace System Management Appliance | 2018-06-29 | 9.0 HIGH | 8.8 HIGH |
| In order to perform actions that requires higher privileges, the Quest KACE System Management Appliance 8.0.318 relies on a message queue managed that runs with root privileges and only allows a set of commands. One of the available commands allows changing any user's password (including root). A low-privilege user could abuse this feature by changing the password of the 'kace_support' account, which comes disabled by default but has full sudo privileges. | |||||
