Page 2 of 10 results (0.012 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in ConnectWise Automate before 2021.5. A blind SQL injection vulnerability exists in core agent inventory communication that can enable an attacker to extract database information or administrative credentials from an instance via crafted monitor status responses. Se ha detectado un problema en ConnectWise Automate versiones anteriores a 2021.5. Se presenta una vulnerabilidad de inyección SQL ciega en la comunicación del inventario del agente principal que puede permitir a un atacante extraer información de la base de datos o credenciales administrativas de una instancia por medio de respuestas de estado de monitorización diseñadas • https://home.connectwise.com/securityBulletin/609a9dd75cb8450001e85369 https://www.connectwise.com/company/trust/security-bulletins https://www.connectwise.com/platform/unified-management/automate • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

The Agent Update System in ConnectWise Automate before 2020.8 allows Privilege Escalation because the _LTUPDATE folder has weak permissions. El Agent Update System en ConnectWise Automate versiones anteriores a 2020.8, permite una Escalada de Privilegios porque la carpeta _LTUPDATE presenta permisos débiles • https://dbeta.com/2020/10/05/PrivilegeEscalationInAutomateAgent https://www.connectwise.com/company/trust/security-bulletins • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

ConnectWise Automate through 2020.x has insufficient validation on certain authentication paths, allowing authentication bypass via a series of attempts. This was patched in 2020.7 and in a hotfix for 2019.12. ConnectWise Automate versiones hasta 2020.x, presenta una comprobación insuficiente en determinadas rutas de autenticación, permitiendo una omisión de autenticación por medio de una serie de intentos. Esto fue parcheado en versión 2020.7 y en una revisión para la versión 2019.12 • https://slagle.tech/2020/07/06/cve-2020-15027 • CWE-287: Improper Authentication •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

A SQLi exists in the probe code of all Connectwise Automate versions before 2020.7 or 2019.12. A SQL Injection in the probe implementation to save data to a custom table exists due to inadequate server side validation. As the code creates dynamic SQL for the insert statement and utilizes the user supplied table name with little validation, the table name can be modified to allow arbitrary update commands to be run. Usage of other SQL injection techniques such as timing attacks, it is possible to perform full data extraction as well. Patched in 2020.7 and in a hotfix for 2019.12. • https://slagle.tech/2020/07/06/cve-2020-15008 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 6EXPL: 0

By using an Automate API in ConnectWise Automate before 2020.5.178, a remote authenticated user could execute commands and/or modifications within an individual Automate instance by triggering an SQL injection vulnerability in /LabTech/agent.aspx. This affects versions before 2019.12.337, 2020 before 2020.1.53, 2020.2 before 2020.2.85, 2020.3 before 2020.3.114, 2020.4 before 2020.4.143, and 2020.5 before 2020.5.178. Al usar una API de Automate en ConnectWise Automate versiones anteriores a 2020.5.178, un usuario autenticado remoto podría ejecutar comandos y/o modificaciones dentro de una instancia Automate individual activando una vulnerabilidad de inyección SQL en /LabTech/agent.aspx. Esto afecta a las versiones anteriores a 2019.12.337, 2020 anteriores a 2020.1.53, 2020.2 anteriores a 2020.2.85, 2020.3 anteriores a 2020.3.114, 2020.4 anteriores a 2020.4.143, y 2020.5 anteriores a 2020.5.178 • https://www.connectwise.com/company/trust#tab1 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •