CVE-2019-5642 – MAGICK
https://notcve.org/view.php?id=CVE-2019-5642
06 Nov 2019 — Rapid7 Metasploit Pro version 4.16.0-2019081901 and prior suffers from an instance of CWE-732, wherein the unique server.key is written to the file system during installation with world-readable permissions. This can allow other users of the same system where Metasploit Pro is installed to intercept otherwise private communications to the Metasploit Pro web interface. Rapid7 Metasploit Pro versión 4.16.0-2019081901 y anterior, sufre de una instancia de CWE-732, en la que el único server.key es escrito en el... • https://help.rapid7.com/metasploit/release-notes/?rid=4.16.0-2019091001 • CWE-732: Incorrect Permission Assignment for Critical Resource •
CVE-2019-5638 – Rapid7 Nexpose Insufficient Session Management
https://notcve.org/view.php?id=CVE-2019-5638
21 Aug 2019 — Rapid7 Nexpose versions 6.5.50 and prior suffer from insufficient session expiration when an administrator performs a security relevant edit on an existing, logged on user. For example, if a user's password is changed by an administrator due to an otherwise unrelated credential leak, that user account's current session is still valid after the password change, potentially allowing the attacker who originally compromised the credential to remain logged in and able to cause further damage. Las versiones de Ra... • https://docs.rapid7.com/insightvm/enable-insightvm-platform-login • CWE-613: Insufficient Session Expiration •
CVE-2019-5631 – Rapid7 InsightAppSec Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2019-5631
19 Aug 2019 — The Rapid7 InsightAppSec broker suffers from a DLL injection vulnerability in the 'prunsrv.exe' component of the product. If exploited, a local user of the system (who must already be authenticated to the operating system) can elevate their privileges with this vulnerability to the privilege level of InsightAppSec (usually, SYSTEM). This issue affects version 2019.06.24 and prior versions of the product. El broker Rapid7 InsightAppSec, sufre de una vulnerabilidad de inyección DLL en el componente 'prunsrv.e... • https://help.rapid7.com/insightappsec/release-notes/archive/2019/07 • CWE-426: Untrusted Search Path CWE-427: Uncontrolled Search Path Element •
CVE-2019-5630 – Rapid7 Nexpose/InsightVM Security Console CSRF
https://notcve.org/view.php?id=CVE-2019-5630
03 Jul 2019 — A Cross-Site Request Forgery (CSRF) vulnerability was found in Rapid7 Nexpose InsightVM Security Console versions 6.5.0 through 6.5.68. This issue allows attackers to exploit CSRF vulnerabilities on API endpoints using Flash to circumvent a cross-domain pre-flight OPTIONS request. Se encontró una vulnerabilidad de falsificación de solicitudes en Cross-Site (CSRF) en las versiones 6.5.0 a 6.5.68 de la consola de seguridad InsightVM de Rapid7 Nexpose. Este problema permite a los atacantes aprovechar las vulne... • https://github.com/rbeede/CVE-2019-5630 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2019-5629 – Rapid7 Windows InsightIDR Agent 2.6.3.14 Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2019-5629
03 Jun 2019 — Rapid7 Insight Agent, version 2.6.3 and prior, suffers from a local privilege escalation due to an uncontrolled DLL search path. Specifically, when Insight Agent 2.6.3 and prior starts, the Python interpreter attempts to load python3.dll at "C:\DLLs\python3.dll," which normally is writable by locally authenticated users. Because of this, a malicious local user could use Insight Agent's startup conditions to elevate to SYSTEM privileges. This issue was fixed in Rapid7 Insight Agent 2.6.4. Insight Agent de Ra... • https://packetstorm.news/files/id/153159 • CWE-427: Uncontrolled Search Path Element •
CVE-2019-5624 – Rapid7 Metasploit Framework Zip Import Directory Traversal
https://notcve.org/view.php?id=CVE-2019-5624
30 Apr 2019 — Rapid7 Metasploit Framework suffers from an instance of CWE-22, Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in the Zip import function of Metasploit. Exploiting this vulnerability can allow an attacker to execute arbitrary code in Metasploit at the privilege level of the user running Metasploit. This issue affects: Rapid7 Metasploit Framework version 4.14.0 and prior versions. Rapid7 Metasploit Framework padece de una situación de CWE-22, limitación inapropiada de un Pathn... • https://github.com/VoidSec/CVE-2019-5624 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2019-5615 – Rapid7 InsightVM Stored Credential Exposure
https://notcve.org/view.php?id=CVE-2019-5615
09 Apr 2019 — Users with Site-level permissions can access files containing the username-encrypted passwords of Security Console Global Administrators and clear-text passwords for restoring backups, as well as the salt for those passwords. Valid credentials are required to access these files and malicious users would still need to perform additional work to decrypt the credentials and escalate privileges. This issue affects: Rapid7 InsightVM versions 6.5.11 through 6.5.49. Los usuarios con permisos Site-level pueden acce... • https://help.rapid7.com/insightvm/en-us/release-notes/#6.5.50 • CWE-257: Storing Passwords in a Recoverable Format CWE-522: Insufficiently Protected Credentials •
CVE-2018-5559
https://notcve.org/view.php?id=CVE-2018-5559
28 Nov 2018 — In Rapid7 Komand version 0.41.0 and prior, certain endpoints that are able to list the always encrypted-at-rest connection data could return some configurations of connection data without obscuring sensitive data from the API response sent over an encrypted channel. This issue does not affect Rapid7 Komand version 0.42.0 and later versions. En Rapid7 Komand, en versiones 0.41.0 y anteriores, ciertos extremos que pueden listar los datos de conexión, siempre cifrados en reposo podrían devolver algunas configu... • https://docs.komand.com/docs/release-notes#section-komand-v0-42-0-2018-11-1 • CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer CWE-312: Cleartext Storage of Sensitive Information •
CVE-2017-5264 – Nexpose < 6.4.66 - Cross-Site Request Forgery
https://notcve.org/view.php?id=CVE-2017-5264
14 Dec 2017 — Versions of Nexpose prior to 6.4.66 fail to adequately validate the source of HTTP requests intended for the Automated Actions administrative web application, and are susceptible to a cross-site request forgery (CSRF) attack. Las versiones de Nexpose anteriores a la 6.4.66 no validan adecuadamente el origen de peticiones HTTP destinadas a la aplicación web administrativa Automated Actions, siendo vulnerables ante un ataque de Cross-Site Request Forgery (CSRF). Rapid7 Nexpose version 6.4.65 suffers from a cr... • https://packetstorm.news/files/id/146134 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2017-15084 – Metasploit Web UI < 4.14.1-20170828 - Cross-Site Request Forgery
https://notcve.org/view.php?id=CVE-2017-15084
06 Oct 2017 — The web UI in Rapid7 Metasploit before 4.14.1-20170828 allows logout CSRF, aka R7-2017-22. La interfaz web de usuario en Rapid7 Metasploit en versiones anteriores a la 4.14.1-20170828 permite el CSRF al cerrar sesión. Esto también se conoce como R7-2017-22. • https://packetstorm.news/files/id/144528 • CWE-352: Cross-Site Request Forgery (CSRF) •