BC Security Empire before 5.9.3 is vulnerable to a path traversal issue that can lead to remote code execution. A remote, unauthenticated attacker can exploit this vulnerability over HTTP by acting as a normal agent, completing all cryptographic handshakes, and then triggering an upload of payload data containing a malicious path.
References
Configurations
No configuration.
History
21 Nov 2024, 09:49
Type | Values Removed | Values Added |
---|---|---|
References | () https://aceresponder.com/blog/exploiting-empire-c2-framework - | |
References | () https://github.com/ACE-Responder/Empire-C2-RCE-PoC - | |
References | () https://github.com/BC-SECURITY/Empire/blob/8283bbc77250232eb493bf1f9104fdd0d468962a/CHANGELOG.md?plain=1#L102 - | |
References | () https://vulncheck.com/advisories/empire-unauth-rce - | |
Summary |
|
27 Jun 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-27 20:15
Updated : 2024-11-21 09:49
NVD link : CVE-2024-6127
Mitre link : CVE-2024-6127
CVE.ORG link : CVE-2024-6127
JSON object : View
Products Affected
No product.
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')