CVE-2018-11137

The 'checksum' parameter of the '/common/download_attachment.php' script in the Quest KACE System Management Appliance 8.0.318 can be abused to read arbitrary files with 'www' privileges via Directory Traversal. No administrator privileges are needed to execute this script.
Configurations

Configuration 1 (hide)

cpe:2.3:a:quest:kace_system_management_appliance:8.0.318:*:*:*:*:*:*:*

History

21 Nov 2024, 03:42

Type Values Removed Values Added
References () https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities - Exploit, Technical Description, Third Party Advisory () https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities - Exploit, Technical Description, Third Party Advisory

Information

Published : 2018-05-31 18:29

Updated : 2024-11-21 03:42


NVD link : CVE-2018-11137

Mitre link : CVE-2018-11137

CVE.ORG link : CVE-2018-11137


JSON object : View

Products Affected

quest

  • kace_system_management_appliance
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')