When uploading a file in Sysax Multi Server 6.90, an authenticated user can modify the filename="" parameter in the uploadfile_name1.htm form to a length of 368 or more bytes. This will create a buffer overflow condition, causing the application to crash.
References
Link | Resource |
---|---|
https://www.hosaka.co.uk/2020/06/08/sysax-multi-server-buffer-overflow/ | Exploit Third Party Advisory |
https://www.hosaka.co.uk/2020/06/08/sysax-multi-server-buffer-overflow/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:13
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.hosaka.co.uk/2020/06/08/sysax-multi-server-buffer-overflow/ - Exploit, Third Party Advisory |
Information
Published : 2020-08-19 16:15
Updated : 2024-11-21 05:13
NVD link : CVE-2020-23574
Mitre link : CVE-2020-23574
CVE.ORG link : CVE-2020-23574
JSON object : View
Products Affected
sysax
- multi_server
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer