39 results (0.010 seconds)

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

The Alcatel A30 device with a build fingerprint of TCL/5046G/MICKEY6US:7.0/NRD90M/J63:user/release-keys contains a hidden privilege escalation capability to achieve command execution as the root user. They have made modifications that allow a user with physical access to the device to obtain a root shell via ADB. Modifying the read-only properties by an app as the system user creates a UNIX domain socket named factory_test that will execute commands as the root user by processes that have privilege to access it (as per the SELinux rules that the vendor controls). El dispositivo Alcatel A30 con una build de huella dactilar de TCL/5046G/MICKEY6US:7.0/NRD90M/J63:user/release-keys contiene una capacidad de escalado de privilegios oculto para lograr ejecutar comandos como usuario root. Han realizado modificaciones que permiten que un usuario con acceso físico al dispositivo obtenga un shell root mediante ADB. • https://www.kryptowire.com/portal/android-firmware-defcon-2018 •

CVSS: 10.0EPSS: 7%CPEs: 3EXPL: 3

Alcatel-Lucent OmniVista 8770 2.0 through 3.0 exposes different ORBs interfaces, which can be queried using the GIOP protocol on TCP port 30024. An attacker can bypass authentication, and OmniVista invokes methods (AddJobSet, AddJob, and ExecuteNow) that can be used to run arbitrary commands on the server, with the privilege of NT AUTHORITY\SYSTEM on the server. NOTE: The discoverer states "The vendor position is to refer to the technical guidelines of the product security deployment to mitigate this issue, which means applying proper firewall rules to prevent unauthorised clients to connect to the OmniVista server." Alcatel-Lucent OmniVista 8770 2.0 hasta la versión 3.0 expone diferentes interfaces ORBs, las cuales se pueden consultar usando el protocolo GIOP en el TCP puerto 30024. Un atacante puede eludir la autenticación, y OmniVista recurre a métodos (AddJobSet, AddJob y ExecuteNow) que pueden ser usados para ejecutar comandos arbitrarios en el servidor, con el privilegio de NT AUTHORITY\SYSTEM en el servidor. • https://www.exploit-db.com/exploits/40862 http://blog.malerisch.net/2016/12/alcatel-omnivista-8770-unauth-rce-giop-corba.html http://www.securityfocus.com/bid/94649 https://github.com/malerisch/omnivista-8770-unauth-rce https://www.youtube.com/watch?v=aq37lQKa9sk • CWE-264: Permissions, Privileges, and Access Controls CWE-287: Improper Authentication •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in the Management Console in Alcatel-Lucent Motive Home Device Manager (HDM) before 4.2 allow remote attackers to inject arbitrary web script or HTML via the (1) deviceTypeID parameter to DeviceType/getDeviceType.do; the (2) policyActionClass or (3) policyActionName parameter to PolicyAction/findPolicyActions.do; the deviceID parameter to (4) SingleDeviceMgmt/getDevice.do or (5) device/editDevice.do; the operation parameter to (6) ajax.do or (7) xmlHttp.do; or the (8) policyAction, (9) policyClass, or (10) policyName parameter to policy/findPolicies.do. Múltiples vulnerabilidades de XSS en Management Console en Alcatel-Lucent Motive Home Device Manager (HDM) en versiones anteriores a 4.2 permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del parámetro (1) deviceTypeID para DeviceType/getDeviceType.do; el parámetro (2) policyActionClass o (3) policyActionName para PolicyAction/findPolicyActions.do; el parámetro deviceID para (4) SingleDeviceMgmt/getDevice.do o (5) device/editDevice.do; el parámetro de operación para (6) ajax.do o (7) xmlHttp.do; o el parámetro (8) policyAction, (9) policyClass, o (10) policyName para policy/findPolicies.do. The Alcatel Lucent Home Device Manager management console suffers from multiple cross site scripting vulnerabilities. • http://seclists.org/fulldisclosure/2016/Jan/0 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

Alcatel-Lucent Home Device Manager before 4.1.10, 4.2.x before 4.2.2 allows remote attackers to spoof and make calls as target devices. Alcatel-Lucent Home Device Manager en versiones anteriores a la 4.1.10, y en versiones 4.2.x anteriores a la 4.2.2 permite que atacantes remotos hagan una suplantación y realicen llamadas como dispositivos objetivo. • http://packetstormsecurity.com/files/134191/Alcatel-Lucent-Home-Device-Manager-Spoofing.html http://seclists.org/fulldisclosure/2015/Nov/6 http://www.securityfocus.com/bid/77406 • CWE-254: 7PK - Security Features •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 1

Cross-site scripting (XSS) vulnerability in the Alcatel-Lucent CellPipe 7130 router with firmware 1.0.0.20h.HOL allows remote attackers to inject arbitrary web script or HTML via the "Custom application" field in the "port triggering" menu. Vulnerabilidad de XSS en el router Alcatel-Lucent CellPipe 7130 con firmware 1.0.0.20h.HOL permite a atacantes remotos inyectar secuencias de comandos web arbitrarios o HTML a través del campo 'Custom application' en el menú 'port triggering'. CellPipe 7130 router version 1.0.0.20h.HOL suffers from a cross site scripting vulnerability. • http://packetstormsecurity.com/files/132327/CellPipe-7130-Cross-Site-Scripting.html http://www.securityfocus.com/bid/75305 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •