Page 5 of 74 results (0.017 seconds)

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

03 Sep 2020 — Rapid7 Nexpose installer version prior to 6.6.40 contains an Unquoted Search Path which may allow an attacker on the local machine to insert an arbitrary file into the executable path. This issue affects: Rapid7 Nexpose versions prior to 6.6.40. El instalador de Rapid7 Nexpose versiones anteriores a 6.6.40, contiene una Ruta de Búsqueda Sin Comillas que puede permitir a un atacante en la máquina local insertar un archivo arbitrario en la ruta ejecutable. Este problema afecta a: Rapid7 Nexpose versiones... • https://help.rapid7.com/insightvm/en-us/release-notes/index.html?pid=6.6.40 • CWE-428: Unquoted Search Path or Element •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

03 Sep 2020 — In Rapid7 Nexpose installer versions prior to 6.6.40, the Nexpose installer calls an executable which can be placed in the appropriate directory by an attacker with access to the local machine. This would prevent the installer from distinguishing between a valid executable called during a Security Console installation and any arbitrary code executable using the same file name. En el instalador de Rapid7 Nexpose versiones anteriores a 6.6.40, el instalador de Nexpose llama un ejecutable que puede ser colocad... • https://help.rapid7.com/insightvm/en-us/release-notes/index.html?pid=6.6.40 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 95%CPEs: 1EXPL: 1

01 Sep 2020 — By sending a specially crafted HTTP GET request to a listening Rapid7 Metasploit HTTP handler, an attacker can register an arbitrary regular expression. When evaluated, this malicious handler can either prevent new HTTP handler sessions from being established, or cause a resource exhaustion on the Metasploit server. Mediante el envío de una petición GET HTTP especialmente diseñada hacia un manejador HTTP de Rapid7 Metasploit que esté escuchando, un atacante puede registrar una expresión regular arbitraria.&... • https://packetstorm.news/files/id/180527 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 1

24 Aug 2020 — The Metasploit Framework module "auxiliary/admin/http/telpho10_credential_dump" module is affected by a relative path traversal vulnerability in the untar method which can be exploited to write arbitrary files to arbitrary locations on the host file system when the module is run on a malicious HTTP server. El módulo "auxiliar/admin/http/telpho10_credential_dump" del módulo Metasploit Framework está afectado por una vulnerabilidad de salto de ruta relativa en el método untar que puede ser explotado para escr... • https://github.com/rapid7/metasploit-framework/issues/14015 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-23: Relative Path Traversal •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

24 Aug 2020 — The Metasploit Framework module "post/osx/gather/enum_osx module" is affected by a relative path traversal vulnerability in the get_keychains method which can be exploited to write arbitrary files to arbitrary locations on the host filesystem when the module is run on a malicious host. El módulo de Metasploit Framework "post/osx/gather/enum_osx module" está afectado por una vulnerabilidad de salto de ruta relativa en el método get_keychains que puede ser explotado para escribir archivos arbitrarios en ubica... • https://github.com/rapid7/metasploit-framework/issues/14008 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-23: Relative Path Traversal •

CVSS: 6.1EPSS: 0%CPEs: 76EXPL: 1

25 Jun 2020 — Cross-site Scripting (XSS) vulnerability in the 'notes' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target store an XSS sequence in the Metasploit Pro console, which will trigger when the operator views the record of that scanned host in the Metasploit Pro interface. This issue affects Rapid7 Metasploit Pro version 4.17.1-20200427 and prior versions, and is fixed in Metasploit Pro version 4.17.1-20200514. See also CVE-2020-7... • https://avalz.it/research/metasploit-pro-xss-to-rce • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 76EXPL: 1

25 Jun 2020 — Cross-site Scripting (XSS) vulnerability in the 'host' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target to store an XSS sequence in the Metasploit Pro console, which will trigger when the operator views the record of that scanned host in the Metasploit Pro interface. This issue affects Rapid7 Metasploit Pro version 4.17.1-20200427 and prior versions, and is fixed in Metasploit Pro version 4.17.1-20200514. See also CVE-2020... • https://avalz.it/research/metasploit-pro-xss-to-rce • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.8EPSS: 19%CPEs: 1EXPL: 1

17 Apr 2020 — Rapid7 Metasploit Framework versions before 5.0.85 suffers from an instance of CWE-78: OS Command Injection, wherein the libnotify plugin accepts untrusted user-supplied data via a remote computer's hostname or service name. An attacker can create a specially-crafted hostname or service name to be imported by Metasploit from a variety of sources and trigger a command injection on the operator's terminal. Note, only the Metasploit Framework and products that expose the plugin system is susceptible to this is... • https://github.com/rapid7/metasploit-framework/issues/13026 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

25 Jan 2020 — Rapid7 Nexpose before 5.5.4 contains a session hijacking vulnerability which allows remote attackers to capture a user's session and gain unauthorized access. Rapid7 Nexpose versiones anteriores a 5.5.4, contiene una vulnerabilidad de secuestro de sesión que permite a atacantes remotos capturar la sesión de un usuario y conseguir un acceso no autorizado. • http://www.securityfocus.com/bid/57150 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

22 Jan 2020 — The Chrome Plugin for Rapid7 AppSpider can incorrectly keep browser sessions active after recording a macro, even after a restart of the Chrome browser. This behavior could make future session hijacking attempts easier, since the user could believe a session was closed when it was not. This issue affects Rapid7 AppSpider version 3.8.213 and prior versions, and is fixed in version 3.8.215. El Plugin de Chrome para Rapid7 AppSpider puede mantener activas las sesiones del navegador incorrectamente después de g... • https://help.rapid7.com/appspiderenterprise/release-notes/?rid=3.8.215 • CWE-613: Insufficient Session Expiration •