This vulnerability allows remote attackers to bypass authentication on vulnerable installations of Quest NetVault Backup 11.2.0.13. The specific flaw exists within JSON RPC Request handling. By setting the checksession parameter to a specific value, it is possible to bypass authentication to critical functions. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-4752.
References
Link | Resource |
---|---|
https://zerodayinitiative.com/advisories/ZDI-18-006 | Third Party Advisory VDB Entry |
https://zerodayinitiative.com/advisories/ZDI-18-006 | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 03:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://zerodayinitiative.com/advisories/ZDI-18-006 - Third Party Advisory, VDB Entry |
Information
Published : 2018-02-08 18:29
Updated : 2024-11-21 03:59
NVD link : CVE-2018-1163
Mitre link : CVE-2018-1163
CVE.ORG link : CVE-2018-1163
JSON object : View
Products Affected
quest
- netvault_backup
CWE