Overview: On January 2020, an Improper Access Control vulnerability had discovered in eG manager. Exploitation leads to Remote Code Execution. Improper Access Control describes failure in AAA (Authentication, Authorization, Accounting) security model. The eG Manager is a central web portal which provides administrators with authenticated access over the web to the performance statistics stored in … Continue reading “eG Manager Remote Code Execution Vulnerability(CVE-2020-8591)”
FusionAuth Remote Code Execution Vulnerability(CVE-2020-7799)
Overview A Remote Code Execution (RCE) vulnerability had discovered in FusionAuth. An authencated attacker can execute commands on system using the Apache FreeMarker Expression language. What is FusionAuth? FusionAuth is an identity access management application. It provides features like registration, login, SSO, MFA, password hashing, password constraints, password reset, email templates, OAuth, OpenID Connect and others. All … Continue reading “FusionAuth Remote Code Execution Vulnerability(CVE-2020-7799)”
Docker Desktop Privilege Escalation Vulnerability(CVE-2020-11492)
Vulnerability Overview: Recently, a vulnerability has been discovered in Docker Desktop. This flaw allows a local user to escalate privilege on the system. Vulnerability exist in the docker Desktop service. Before looking into vulnerability, understand few concepts Docker Desktop and named pipe. Docker Desktop for Windows provides an environment for building, shipping, and running dockerized … Continue reading “Docker Desktop Privilege Escalation Vulnerability(CVE-2020-11492)”
CISCO ANYCONNECT secure mobility client on Windows Privilege Escalation Vulnerability (CVE-2020-3153)
Summary: Recently,a critical vulnerability was observed in wild in Cisco AnyConnect Secure Mobility Client on Windows. Its a privilege escalation vulnerability occurs with a manipulation with an unknown input. Classified as CWE-427 impacting the CIA triad. Description: This vulnerability is exploitable only by an authenticated as well as local attacker. It allows an attacker to … Continue reading “CISCO ANYCONNECT secure mobility client on Windows Privilege Escalation Vulnerability (CVE-2020-3153)”
Microsoft SharePoint Remote Code Execution Vulnerability(CVE-2020-0932)
Overview Microsoft has released a patch in April,2020 to fix the Remote Code Execution vulnerability CVE-2020-0932 discovered in SharePoint. Successful exploitation of this vulnerability allows authenticated user to execute arbitrary command on the server. POC is available on GitHub. Description: There are different web services present in SharePoint. One of them is WebPartPages, provide the … Continue reading “Microsoft SharePoint Remote Code Execution Vulnerability(CVE-2020-0932)”
Parallels Desktop Privilege Escalation And Out-Of-Bounds Vulnerability(CVE-2020-8871)
Overview: On May 2020, Parallels company has released security patch to fix the vulnerability CVE-2020-8871. Vulnerability could allow local user on the guest OS to escalate privileges and execute code on the host. Bug present in Parallels Desktop for Mac, product of Parallels. Parallels Desktop for Mac is software providing hardware virtualization for Mac. To … Continue reading “Parallels Desktop Privilege Escalation And Out-Of-Bounds Vulnerability(CVE-2020-8871)”
QNAP Pre-Auth Root RCE Vulnerability(CVE-2019-7192,CVE-2019-7193,CVE-2019-7194,CVE-2019-7195)
Overview In 2019, multiple vulnerabilities had discovered for QNAP PhotoStation and CGI programs. These vulnerabilities can be chained into a pre-auth root Remote Code Execution. More than 450K devices using QNAP PhotoStation and CGI programs are vulnerable to attack. Vulnerability 1: Pre-Auth Local File Disclosure Vulnerable code present in following function, After execution of exportfile … Continue reading “QNAP Pre-Auth Root RCE Vulnerability(CVE-2019-7192,CVE-2019-7193,CVE-2019-7194,CVE-2019-7195)”
Symantec Endpoint Protection Privilege Escalation Vulnerability(CVE-2020-5837)
Overview A Privilege Escalation vulnerability has found in the Symantec Endpoint Protection (SEP) which allows attacker to create file anywhere in the system. Description Symantec Endpoint Protection create scanning log at “C:\Users\%username%\AppData\Local\Symantec\Symantec Endpoint Protection\Logs” with high privileges It’s possible to save scanning logs at different location using symbolic link. In windows to create symbolic link … Continue reading “Symantec Endpoint Protection Privilege Escalation Vulnerability(CVE-2020-5837)”
Thunderspy attacking Thunderbolt enabled PCs
Summary: In February 2020, researchers reached out to Intel with a report on Thunderbolt, which they refer to as “Thunderspy”. The so-called Thunderspy attack takes less than five minutes to pull off with physical access to a device, and it affects any PC manufactured before 2019. Description: This Vulnerability is in fact new, and their … Continue reading “Thunderspy attacking Thunderbolt enabled PCs”
Windows Print Spooler Privilege Escalation Vulnerability(CVE-2020-1048)
Overview On May 2020 Microsoft has released the patch for privilege escalation vulnerability present in Windows Print Spooler service. The Print Spooler Service helps your Windows computer interact with the printer, and orders the print jobs in your queue. To exploit this vulnerability attacker must have access to target system. The vulnerability is not remotely … Continue reading “Windows Print Spooler Privilege Escalation Vulnerability(CVE-2020-1048)”