Name |
DupScout Enterprise 10.0.18 'sid' Buffer Overflow |
Code name |
|
Product |
DupScout Enterprise |
Versions |
10.0.18 |
Fixed versions |
13.2.24 |
Release date |
2020-12-15 14:00 COT |
Kind |
Stack Buffer Overflow |
Rule |
|
Remote |
Yes |
CVSSv3 Vector |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
CVSSv3 Base Score |
9.8 CRITICAL |
CVSSv2 Vector |
AV:N/AC:L/Au:N/C:C/I:C/A:C |
CVSSv2 Base Score |
10 HIGH |
Exploit available |
Yes |
Exploit URL |
|
CVE ID(s) |
A stack buffer overflow was found in the sid
GET
parameter of
several requests of DupScout Enterprise 10.0.18 which can be exploited
by an unauthenticated, remote user to gain NT AUTHORITY\SYSTEM
privileges
on the server holding the affected software.
A first version of the exploit was published at Exploit DB and an updated exploit can be found here.
An updated version of DupScout Enterprise is available at the vendor page.
The vulnerability was discovered by Andrés Roldán
from the Offensive Team of Fluid Attacks
.
CVE |
|
Exploit |
|
Updated exploit |
|
Vendor page |
Corporate member of The OWASP Foundation
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.