Name: DupScout Enterprise 10.0.18 'sid' Buffer Overflow
Code name: Prine
Product: DupScout Enterprise
Versions: 10.0.18
Fixed versions: 13.2.24
Release date: 2020-12-15 14:00 COT
Kind: Stack Buffer Overflow
Remote: Yes
Exploit available: Yes
Exploit URL: https://www.exploit-db.com/exploits/49217
CVE ID(s): CVE-2020-29659
A stack buffer overflow was found in the sid
GET
parameter of
several requests of DupScout Enterprise 10.0.18 which can be exploited
by an unauthenticated, remote user to gain NT AUTHORITY\SYSTEM
privileges
on the server holding the affected software.
A first version of the exploit was published at Exploit DB and an updated exploit can be found here.
An updated version of DupScout Enterprise is available at the vendor page.
The vulnerability was discovered by Andrés Roldán
from the Offensive Team of Fluid Attacks
.
CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29659
Updated exploit: prine-exploit.py
Vendor page: https://www.dupscout.com/
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.