STRATO HiDrive Desktop Client 5.0.1.0 for Windows suffers from a SYSTEM privilege escalation vulnerability through the HiDriveMaintenanceService service. This service establishes a NetNamedPipe endpoint that allows applications to connect and call publicly exposed methods. An attacker can inject and execute code by hijacking the insecure communications with the service. This vulnerability also affects Telekom MagentaCLOUD through 5.7.0.0 and 1&1 Online Storage through 6.1.0.0.
References
Link | Resource |
---|---|
https://zer0-day.pw/articles/2019-04/HiDrive-LPE-via-Insecure-WCF-endpoint | Exploit Third Party Advisory |
https://zer0-day.pw/articles/2019-04/HiDrive-LPE-via-Insecure-WCF-endpoint | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://zer0-day.pw/articles/2019-04/HiDrive-LPE-via-Insecure-WCF-endpoint - Exploit, Third Party Advisory |
Information
Published : 2019-04-30 19:29
Updated : 2024-11-21 04:51
NVD link : CVE-2019-9486
Mitre link : CVE-2019-9486
CVE.ORG link : CVE-2019-9486
JSON object : View
Products Affected
ionos
- 1\&1_online_storage
telekom
- magentacloud
strato
- hidrive_desktop_client
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition