DupScout Enterprise 10.0.18 BoF


Name DupScout Enterprise 10.0.18 'sid' Buffer Overflow
Code name Prine
Product DupScout Enterprise
Versions 10.0.18
Fixed versions 13.2.24
Release date 2020-12-15 14:00 COT


Kind Stack Buffer Overflow
Rule 345. Establish protections against overflows
Remote Yes
CVSSv3 Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSSv3 Base Score 9.8 CRITICAL
CVSSv2 Vector AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSSv2 Base Score 10 HIGH
Exploit available Yes
Exploit URL https://www.exploit-db.com/exploits/49217
CVE ID(s) CVE-2020-29659


A stack buffer overflow was found in the sid GET parameter of several requests of DupScout Enterprise 10.0.18 which can be exploited by an unauthenticated, remote user to gain NT AUTHORITY\SYSTEM privileges on the server holding the affected software.


A first version of the exploit was published at Exploit DB and an updated exploit can be found here.


An updated version of DupScout Enterprise is available at the vendor page.


The vulnerability was discovered by Andrés Roldán from the Offensive Team of Fluid Attacks.


CVE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29659
Exploit https://www.exploit-db.com/exploits/49217
Updated exploit prine-exploit.py
Vendor page https://www.dupscout.com/