2 results (0.008 seconds)

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 0

RSA NetWitness Platform versions prior to 11.1.0.2 and RSA Security Analytics versions prior to 10.6.6 are vulnerable to a server-side template injection vulnerability due to insecure configuration of the template engine used in the product. A remote authenticated malicious RSA NetWitness Server user with an Admin or Operator role could exploit this vulnerability to execute arbitrary commands on the server with root privileges. RSA NetWitness Platform en versiones anteriores a la 11.1.0.2 y RSA Security Analytics en versiones anteriores a la 10.6.6 son vulnerables a una vulnerabilidad de inyección de plantillas debido a una configuración insegura del motor de plantillas empleado en el producto. Un usuario remoto autenticado malicioso de RSA NetWitness Server con rol de Admin u Operator podría explotar esta vulnerabilidad para ejecutar comandos arbitrarios en el servidor con privilegios root. • http://seclists.org/fulldisclosure/2018/Aug/32 http://www.securityfocus.com/bid/105134 http://www.securitytracker.com/id/1041541 http://www.securitytracker.com/id/1041542 •

CVSS: 6.8EPSS: 0%CPEs: 4EXPL: 0

EMC RSA Security Analytics (SA) 10.x before 10.3, and RSA NetWitness NextGen 9.8, does not ensure that SA Core requests originate from the SA REST UI, which allows remote attackers to bypass intended access restrictions by sending a Core request from a web browser or other unintended user agent. EMC RSA Security Analytics (SA) 10.x anterior a 10.3, y RSA NetWitness NextGen 9.8, no asegura que las peticiones al SA Core se originen en el SA REST UI, lo que permite a atacantes remotos evitar las restricciones de acceso al enviar una solicitud Core desde una web navegador u otro agente de usuario no deseado. • http://archives.neohapsis.com/archives/bugtraq/2013-12/0034.html http://www.securitytracker.com/id/1029446 • CWE-264: Permissions, Privileges, and Access Controls •