4 results (0.001 seconds)

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

Incorrect Access Control in the LDAP class of GONICUS GOsa through 2019-04-11 allows an attacker to log into any account with a username containing the case-insensitive substring "success" when an arbitrary password is provided. Un Control de Acceso Incorrecto en la clase LDAP de GONICUS GOsa hasta el 11-04-2019, permite que un atacante inicie sesión en cualquier cuenta con un nombre de usuario que contiene la subcadena insensible a mayúsculas y minúsculas "success" cuando se proporciona una contraseña arbitraria. • https://github.com/gonicus/gosa/commits/master https://lists.debian.org/debian-lts-announce/2019/08/msg00009.html • CWE-287: Improper Authentication •

CVSS: 6.1EPSS: 1%CPEs: 3EXPL: 0

GONICUS GOsa version before commit 56070d6289d47ba3f5918885954dcceb75606001 contains a Cross Site Scripting (XSS) vulnerability in change password form (html/password.php, #308) that can result in injection of arbitrary web script or HTML. This attack appear to be exploitable via the victim must open a specially crafted web page. This vulnerability appears to have been fixed in after commit 56070d6289d47ba3f5918885954dcceb75606001. GONICUS GOsa en versiones anteriores al commit con ID 56070d6289d47ba3f5918885954dcceb75606001 contiene una vulnerabilidad de Cross-Site Scripting (XSS) en el formulario de cambio de contraseña (html/password.php, #308) que puede resultar en la inyección de scripts web o HTML arbitrarios. El ataque parece ser explotable si una víctima abre una página web especialmente manipulada. • https://github.com/gosa-project/gosa-core/commit/56070d6289d47ba3f5918885954dcceb75606001 https://github.com/gosa-project/gosa-core/issues/14 https://lists.debian.org/debian-lts-announce/2018/07/msg00028.html https://www.debian.org/security/2018/dsa-4239 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

Unspecified vulnerability in GONICUS System Administration (GOsa) before 2.5.8 allows remote authenticated users to modify certain settings, including the admin password, via crafted POST requests. Vulnerabilidad sin especificar en el GONICUS System Administration (GOsa) anterior al 2.5.8 permite a usuarios remotos autenticados modificar ciertas configuraciones, incluida la contraseña del administrador (admin), mediante peticiones POST modificadas. • http://oss.gonicus.de/pipermail/gosa/2007-January/002650.html http://osvdb.org/32821 http://secunia.com/advisories/23749 http://www.vupen.com/english/advisories/2007/0207 https://exchange.xforce.ibmcloud.com/vulnerabilities/31516 •

CVSS: 6.8EPSS: 11%CPEs: 1EXPL: 2

PHP remote file inclusion vulnerability in index.php for GONiCUS System Administrator (GOsa) 1.0 allows remote attackers to execute arbitrary PHP code via the plugin parameter to (1) 3fax/1blocklists/index.php; (2) 6departamentadmin/index.php, (3) 5terminals/index.php, (4) 4mailinglists/index.php, (5) 3departaments/index.php, and (6) 2groupd/index.php in 2administration/; or (7) the base parameter to include/help.php. • https://www.exploit-db.com/exploits/22279 http://lists.grok.org.uk/pipermail/full-disclosure/2003-February/003932.html http://secunia.com/advisories/8120 http://www.securityfocus.com/archive/1/313282/30/25760/threaded http://www.securityfocus.com/bid/6922 http://www.securitytracker.com/id?1006162 https://exchange.xforce.ibmcloud.com/vulnerabilities/11408 • CWE-94: Improper Control of Generation of Code ('Code Injection') •