5 results (0.010 seconds)

CVSS: 9.8EPSS: 3%CPEs: 2EXPL: 5

ZOHO WebNMS Framework 5.2 and 5.2 SP1 use a weak obfuscation algorithm to store passwords, which allows context-dependent attackers to obtain cleartext passwords by leveraging access to WEB-INF/conf/securitydbData.xml. NOTE: this issue can be combined with CVE-2016-6601 for a remote exploit. ZOHO WebNMS Framework 5.2 y 5.2 SP1 utiliza un algoritmo de ofuscación débil para almacenar contraseñas, lo que permite a atacantes dependientes de contexto obtener contraseñas en texto plano aprovechando el acceso a WEB-INF/conf/securitydbData.xml. NOTA: este problema puede combinarse con CVE-2016-6601 para una explotación remota. WebNMS Framework versions 5.2 and 5.2 SP1 suffer from directory traversal, code execution, weak obfuscation, and user impersonation vulnerabilities. • https://www.exploit-db.com/exploits/40229 http://packetstormsecurity.com/files/138244/WebNMS-Framework-5.2-SP1-Traversal-Weak-Obfuscation-User-Impersonation.html http://seclists.org/fulldisclosure/2016/Aug/54 http://www.rapid7.com/db/modules/auxiliary/admin/http/webnms_cred_disclosure http://www.securityfocus.com/archive/1/539159/100/0/threaded http://www.securityfocus.com/bid/92402 https://blogs.securiteam.com/index.php/archives/2712 https://forums.webnms.com/topic/recent-vulnerabilities-in- • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVSS: 9.8EPSS: 97%CPEs: 2EXPL: 5

Directory traversal vulnerability in the file upload functionality in ZOHO WebNMS Framework 5.2 and 5.2 SP1 allows remote attackers to upload and execute arbitrary JSP files via a .. (dot dot) in the fileName parameter to servlets/FileUploadServlet. Vulnerabilidad de salto de directorio la funcionalidad de carga de archivos en ZOHO WebNMS Framework 5.2 y 5.2 SP1 permite a atacantes remotos cargar y ejecutar archivos JSP arbitrarios a través de un .. (punto punto) en el parámetro fileName para servlets/FileUploadServlet. WebNMS Framework versions 5.2 and 5.2 SP1 suffer from directory traversal, code execution, weak obfuscation, and user impersonation vulnerabilities. • https://www.exploit-db.com/exploits/40229 http://packetstormsecurity.com/files/138244/WebNMS-Framework-5.2-SP1-Traversal-Weak-Obfuscation-User-Impersonation.html http://seclists.org/fulldisclosure/2016/Aug/54 http://www.securityfocus.com/archive/1/539159/100/0/threaded http://www.securityfocus.com/bid/92402 https://blogs.securiteam.com/index.php/archives/2712 https://forums.webnms.com/topic/recent-vulnerabilities-in-webnms-and-how-to-protect-the-server-against-them https://github.com/pedrib/ • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 97%CPEs: 2EXPL: 5

Directory traversal vulnerability in the file download functionality in ZOHO WebNMS Framework 5.2 and 5.2 SP1 allows remote attackers to read arbitrary files via a .. (dot dot) in the fileName parameter to servlets/FetchFile. Vulnerabilidad de salto de directorio en la funcionalidad de descarga de archivos en ZOHO WebNMS Framework 5.2 y 5.2 SP1 permite a atacantes remotos leer archivos arbitrarios a través de un .. (punto punto) en el parámetro fileName para servlets/FetchFile. WebNMS Framework versions 5.2 and 5.2 SP1 suffer from directory traversal, code execution, weak obfuscation, and user impersonation vulnerabilities. • https://www.exploit-db.com/exploits/40229 http://packetstormsecurity.com/files/138244/WebNMS-Framework-5.2-SP1-Traversal-Weak-Obfuscation-User-Impersonation.html http://seclists.org/fulldisclosure/2016/Aug/54 http://www.rapid7.com/db/modules/auxiliary/admin/http/webnms_cred_disclosure http://www.rapid7.com/db/modules/auxiliary/admin/http/webnms_file_download http://www.securityfocus.com/archive/1/539159/100/0/threaded http://www.securityfocus.com/bid/92402 https://blogs.securiteam.com/inde • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.8EPSS: 95%CPEs: 2EXPL: 5

ZOHO WebNMS Framework 5.2 and 5.2 SP1 allows remote attackers to bypass authentication and impersonate arbitrary users via the UserName HTTP header. ZOHO WebNMS Framework 5.2 y 5.2 SP1 permite a atacantes remotos eludir la autenticación y suplantar usuarios arbitrarios a través del encabezado HTTP UserName. WebNMS Framework versions 5.2 and 5.2 SP1 suffer from directory traversal, code execution, weak obfuscation, and user impersonation vulnerabilities. • https://www.exploit-db.com/exploits/40229 http://packetstormsecurity.com/files/138244/WebNMS-Framework-5.2-SP1-Traversal-Weak-Obfuscation-User-Impersonation.html http://seclists.org/fulldisclosure/2016/Aug/54 http://www.securityfocus.com/archive/1/539159/100/0/threaded http://www.securityfocus.com/bid/92402 https://blogs.securiteam.com/index.php/archives/2712 https://forums.webnms.com/topic/recent-vulnerabilities-in-webnms-and-how-to-protect-the-server-against-them https://github.com/pedrib/ • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in report/ReportViewAction.do in WebNMS Free Edition 5 allows remote attackers to inject arbitrary web script or HTML via the type parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en report/ReportViewAction.do en WebNMS Free Edition v5 permite a atacantes remotos inyectar secuencias de comandos web o HTML mediante el parámetro "type". NOTA: la procedencia de esta información es desconocida; los detalles se han obtenido exclusivamente de información de terceros. • http://osvdb.org/55188 http://secunia.com/advisories/35495 https://exchange.xforce.ibmcloud.com/vulnerabilities/51250 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •