Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by an information disclosure vulnerability. Through the PUK signature functionality, an administrator will not have access to the current p12 certificate and password. When accessing this functionality, the administrator has the option to replace the current certificate and it is not possible to view the certificate password (p12) already deployed on the platform. The replacement p12 certificate returns to users in base64 with its password, which can be accessed by non-administrator users.
References
Link | Resource |
---|---|
https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/ | Exploit Third Party Advisory |
https://marketing.paxtechnology.com/about-pax | Product |
https://www.whatspos.com/ | Product |
https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/ | Exploit Third Party Advisory |
https://marketing.paxtechnology.com/about-pax | Product |
https://www.whatspos.com/ | Product |
Configurations
History
21 Nov 2024, 05:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/ - Exploit, Third Party Advisory | |
References | () https://marketing.paxtechnology.com/about-pax - Product | |
References | () https://www.whatspos.com/ - Product |
Information
Published : 2021-05-07 11:15
Updated : 2024-11-21 05:28
NVD link : CVE-2020-36127
Mitre link : CVE-2020-36127
CVE.ORG link : CVE-2020-36127
JSON object : View
Products Affected
paxtechnology
- paxstore
CWE
CWE-295
Improper Certificate Validation