COMPAREX Miss Marple Enterprise Edition before 2.0 allows local users to execute arbitrary code by reading the user name and encrypted password hard-coded in an Inventory Agent configuration file.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/150427/Miss-Marple-Enterprise-Edition-File-Upload-Hardcoded-AES-Key.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2018/Nov/55 | Mailing List Third Party Advisory |
https://seclists.org/bugtraq/2018/Nov/37 | Mailing List Third Party Advisory |
https://www.sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-miss-marple-enterprise-edition/ | Third Party Advisory |
http://packetstormsecurity.com/files/150427/Miss-Marple-Enterprise-Edition-File-Upload-Hardcoded-AES-Key.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2018/Nov/55 | Mailing List Third Party Advisory |
https://seclists.org/bugtraq/2018/Nov/37 | Mailing List Third Party Advisory |
https://www.sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-miss-marple-enterprise-edition/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/150427/Miss-Marple-Enterprise-Edition-File-Upload-Hardcoded-AES-Key.html - Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2018/Nov/55 - Mailing List, Third Party Advisory | |
References | () https://seclists.org/bugtraq/2018/Nov/37 - Mailing List, Third Party Advisory | |
References | () https://www.sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-miss-marple-enterprise-edition/ - Third Party Advisory |
Information
Published : 2018-12-20 17:29
Updated : 2024-11-21 03:57
NVD link : CVE-2018-19233
Mitre link : CVE-2018-19233
CVE.ORG link : CVE-2018-19233
JSON object : View
Products Affected
comparex
- miss_marple
CWE
CWE-798
Use of Hard-coded Credentials