The AcuWVSSchedulerv10 service in Acunetix Web Vulnerability Scanner (WVS) before 10 build 20151125 allows local users to gain privileges via a command parameter in the reporttemplate property in a params JSON object to api/addScan.
References
Configurations
History
21 Nov 2024, 02:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/134602/Acunetix-WVS-10-Local-Privilege-Escalation.html - Exploit | |
References | () https://www.acunetix.com/blog/releases/acunetix-10-build-includes-security-checks-in-cors-configurations/ - Vendor Advisory | |
References | () https://www.exploit-db.com/exploits/38847/ - Exploit |
Information
Published : 2015-12-17 19:59
Updated : 2024-11-21 02:30
NVD link : CVE-2015-4027
Mitre link : CVE-2015-4027
CVE.ORG link : CVE-2015-4027
JSON object : View
Products Affected
acunetix
- web_vulnerability_scanner
CWE
CWE-264
Permissions, Privileges, and Access Controls