CVE-2019-20456

Goverlan Reach Console before 9.50, Goverlan Reach Server before 3.50, and Goverlan Client Agent before 9.20.50 have an Untrusted Search Path that leads to Command Injection and Local Privilege Escalation via DLL hijacking.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:goverlan:client_agent:*:*:*:*:*:*:*:*
cpe:2.3:a:goverlan:reach_console:*:*:*:*:*:*:*:*
cpe:2.3:a:goverlan:reach_server:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:38

Type Values Removed Values Added
References () https://www.goverlan.com/knowledge/article/security-advisory-govsa-2019-1028-1-local-privilege-escalation-2/ - Vendor Advisory () https://www.goverlan.com/knowledge/article/security-advisory-govsa-2019-1028-1-local-privilege-escalation-2/ - Vendor Advisory

Information

Published : 2020-02-16 19:15

Updated : 2024-11-21 04:38


NVD link : CVE-2019-20456

Mitre link : CVE-2019-20456

CVE.ORG link : CVE-2019-20456


JSON object : View

Products Affected

goverlan

  • client_agent
  • reach_console
  • reach_server

microsoft

  • windows
CWE
CWE-426

Untrusted Search Path