6 results (0.007 seconds)

CVSS: 9.8EPSS: 86%CPEs: 2EXPL: 1

Bacula-web before 8.0.0-rc2 is affected by multiple SQL Injection vulnerabilities that could allow an attacker to access the Bacula database and, depending on configuration, escalate privileges on the server. Bacula-web, en versiones anteriores a la 8.0.0-rc2, se ha visto afectado por múltiples vulnerabilidades que podrían permitir que un atacante acceda a la base de datos de Bacula y, dependiendo de la configuración, escalar privilegios en el servidor. Bacula-Web versions prior to 8.0.0-RC2 suffer from multiple remote SQL injection vulnerabilities. • https://www.exploit-db.com/exploits/44272 http://bacula-web.org/download/articles/bacula-web-8-0-0-rc2.html http://bugs.bacula-web.org/view.php?id=211 https://github.com/bacula-web/bacula-web/commit/90d4c44a0dd0d65c6fb3ab2417b83d700c8413ae • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 3

SQL injection vulnerability in joblogs.php in Bacula-Web 5.2.10 allows remote attackers to execute arbitrary SQL commands via the jobid parameter. Vulnerabilidad de inyección SQL en joblogs.php en Bacula-Web 5.2.10 permite a atacantes remotos ejecutar comandos SQL arbitrarios a través del parámetro jobid. • https://www.exploit-db.com/exploits/34851 http://osvdb.org/show/osvdb/112418 http://packetstormsecurity.com/files/128480/Bacula-web-5.2.10-SQL-Injection.html http://www.exploit-db.com/exploits/34851 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 4.0EPSS: 0%CPEs: 3EXPL: 0

The dump_resource function in dird/dird_conf.c in Bacula before 5.2.11 does not properly enforce ACL rules, which allows remote authenticated users to obtain resource dump information via unspecified vectors. La función dump_resource de dird/dird_conf.c en Bacula anteriores a v5.2.11 no hace cumplir correctamente las reglas ACL, permitiendo a usuarior remotos autenticados obtener volcados de la información de recursos mediante vectores no especificados. • http://secunia.com/advisories/50535 http://secunia.com/advisories/50808 http://sourceforge.net/projects/bacula/files/bacula/5.2.12/ReleaseNotes/view http://www.bacula.org/en/?page=news http://www.bacula.org/git/cgit.cgi/bacula/commit/?id=67debcecd3d530c429e817e1d778e79dcd1db905 http://www.debian.org/security/2012/dsa-2558 http://www.mandriva.com/security/advisories?name=MDVSA-2012:166 http://www.openwall.com/lists/oss-security/2012/09/14/11 http://www.openwall.com/lists/ • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 0

mtx-changer.Adic-Scalar-24 in bacula-common 2.4.2 allows local users to overwrite arbitrary files via a symlink attack on a /tmp/mtx.##### temporary file, probably a related issue to CVE-2005-2995. mtx-changer.Adic-Scalar-24 in bacula-common v2.4.2, permite a usuarios locales sobrescribir ficheros de su elección a través de un enlace de ataque simbólico sobre el fichero temporal /tmp/mtx.#####. Cuestion probablemente relacionada con el CVE-2005-2995. • http://lists.debian.org/debian-devel/2008/08/msg00347.html http://uvw.ru/report.sid.txt • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

make_catalog_backup in Bacula 2.2.5, and probably earlier, sends a MySQL password as a command line argument, and sometimes transmits cleartext e-mail containing this command line, which allows context-dependent attackers to obtain the password by listing the process and its arguments, or by sniffing the network. make_catalog_backup en Bacula 2.2.5, y posiblemente anteriores, envíe una contraseña MySQL como un argumento de línea de comando, y algunas veces transmite un e-mail en texto plano conteniendo esta línea de comando, lo cual permite a atacantes dependientes del contexto obtener la contraseña listando el proceso y sus argumentos, o realizando sniffing en la red. • http://bugs.bacula.org/view.php?id=990 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446809 http://osvdb.org/41861 http://secunia.com/advisories/27243 http://secunia.com/advisories/31184 http://security.gentoo.org/glsa/glsa-200807-10.xml http://www.securityfocus.com/bid/26156 http://www.vupen.com/english/advisories/2007/3572 https://exchange.xforce.ibmcloud.com/vulnerabilities/37336 • CWE-319: Cleartext Transmission of Sensitive Information •