2 results (0.011 seconds)

CVSS: 9.3EPSS: 4%CPEs: 12EXPL: 2

DenyAll WAF before 6.4.1 allows unauthenticated remote command execution via TCP port 3001 because shell metacharacters can be inserted into the type parameter to the tailDateFile function in /webservices/stream/tail.php. An iToken authentication parameter is required but can be obtained by exploiting CVE-2017-14706. This affects DenyAll i-Suite LTS 5.5.0 through 5.5.12, i-Suite 5.6, Web Application Firewall 5.7, and Web Application Firewall 6.x before 6.4.1, with On Premises or AWS/Azure cloud deployments. DenyAll WAF en versiones anteriores a la 6.4.1 permite la ejecución remota de comandos sin autenticación mediante el puerto TCP 3001 debido a que los metacaracteres shell se pueden insertar en el parámetro type a la función tailDateFile en /webservices/stream/tail.php. Se necesita un parámetro de autenticación iToken, pero puede obtenerse mediante la explotación de CVE-2017-14706. • https://github.com/rapid7/metasploit-framework/pull/8980 https://pentest.blog/advisory-denyall-web-application-firewall-unauthenticated-remote-code-execution https://www.denyall.com/blog/advisories/advisory-unauthenticated-remote-code-execution-denyall-web-application-firewall • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.8EPSS: 31%CPEs: 12EXPL: 2

DenyAll WAF before 6.4.1 allows unauthenticated remote attackers to obtain authentication information by making a typeOf=debug request to /webservices/download/index.php, and then reading the iToken field in the reply. This affects DenyAll i-Suite LTS 5.5.0 through 5.5.12, i-Suite 5.6, Web Application Firewall 5.7, and Web Application Firewall 6.x before 6.4.1, with On Premises or AWS/Azure cloud deployments. DenyAll WAF en versiones anteriores a la 6.4.1 permite que los atacantes remotos sin autenticar obtengan información de autenticación realizando una petición typeOf=debug a /webservices/download/index.php y, a continuación, leyendo el campo iToken en la respuesta. Esto afecta a DenyAll i-Suite LTS desde la versión 5.5.0 hasta la 5.5.12, i-Suite 5.6, Web Application Firewall 5.7 y las versiones 6.x de Web Application Firewall anteriores a la 6.4.1 con implementaciones On Premises o en la nube de AWS/Azure. • https://github.com/rapid7/metasploit-framework/pull/8980 https://pentest.blog/advisory-denyall-web-application-firewall-unauthenticated-remote-code-execution https://www.denyall.com/blog/advisories/advisory-unauthenticated-remote-code-execution-denyall-web-application-firewall • CWE-287: Improper Authentication •