Relative path traversal in Druva inSync Windows Client 6.6.3 allows a local, unauthenticated attacker to execute arbitrary operating system commands with SYSTEM privileges.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/157802/Druva-inSync-Windows-Client-6.6.3-Local-Privilege-Escalation.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/160404/Druva-inSync-Windows-Client-6.6.3-Privilege-Escalation.html | Exploit Third Party Advisory VDB Entry |
https://www.tenable.com/security/research/tra-2020-34 | Exploit Release Notes Third Party Advisory |
http://packetstormsecurity.com/files/157802/Druva-inSync-Windows-Client-6.6.3-Local-Privilege-Escalation.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/160404/Druva-inSync-Windows-Client-6.6.3-Privilege-Escalation.html | Exploit Third Party Advisory VDB Entry |
https://www.tenable.com/security/research/tra-2020-34 | Exploit Release Notes Third Party Advisory |
Configurations
History
21 Nov 2024, 05:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/157802/Druva-inSync-Windows-Client-6.6.3-Local-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/160404/Druva-inSync-Windows-Client-6.6.3-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.tenable.com/security/research/tra-2020-34 - Exploit, Release Notes, Third Party Advisory |
Information
Published : 2020-05-21 15:15
Updated : 2024-11-21 05:34
NVD link : CVE-2020-5752
Mitre link : CVE-2020-5752
CVE.ORG link : CVE-2020-5752
JSON object : View
Products Affected
druva
- insync_client
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')