In order to perform actions that require higher privileges, the Quest KACE System Management Appliance 8.0.318 relies on a message queue that runs daemonized with root privileges and only allows a set of commands to be executed. A command injection vulnerability exists within this message queue which allows low-privilege users to append arbitrary commands that will be run as root.
References
Link | Resource |
---|---|
https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities | Exploit Technical Description Third Party Advisory |
https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities | Exploit Technical Description Third Party Advisory |
Configurations
History
21 Nov 2024, 03:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities - Exploit, Technical Description, Third Party Advisory |
Information
Published : 2018-05-31 18:29
Updated : 2024-11-21 03:42
NVD link : CVE-2018-11132
Mitre link : CVE-2018-11132
CVE.ORG link : CVE-2018-11132
JSON object : View
Products Affected
quest
- kace_system_management_appliance
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')