Zoho Remote Access Plus Server Windows Desktop Binary fixed from 10.1.2121.1 is affected by incorrect access control. The installation directory is vulnerable to weak file permissions by allowing full control for Windows Everyone user group (non-admin or any guest users), thereby allowing privilege escalation, unauthorized password reset, stealing of sensitive data, access to credentials in plaintext, access to registry values, tampering with configuration files, etc.
References
Link | Resource |
---|---|
https://medium.com/nestedif/vulnerability-disclosure-improper-filesystem-permission-misconfigured-acls-zoho-r-a-p-56e195464b51 | Exploit Third Party Advisory |
https://medium.com/nestedif/vulnerability-disclosure-improper-filesystem-permission-misconfigured-acls-zoho-r-a-p-56e195464b51 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://medium.com/nestedif/vulnerability-disclosure-improper-filesystem-permission-misconfigured-acls-zoho-r-a-p-56e195464b51 - Exploit, Third Party Advisory |
Information
Published : 2021-11-17 13:15
Updated : 2024-11-21 06:28
NVD link : CVE-2021-42954
Mitre link : CVE-2021-42954
CVE.ORG link : CVE-2021-42954
JSON object : View
Products Affected
zohocorp
- manageengine_remote_access_plus
microsoft
- windows
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource