6 results (0.004 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

When using Apache Knox SSO prior to 1.6.1, a request could be crafted to redirect a user to a malicious page due to improper URL parsing. A request that included a specially crafted request parameter could be used to redirect the user to a page controlled by an attacker. This URL would need to be presented to the user outside the normal request flow through a XSS or phishing campaign. Cuando era usado Apache Knox SSO versiones anteriores a 1.6.1, una petición podía ser diseñada para redirigir a un usuario a una página maliciosa debido a un análisis incorrecto de la URL. Una petición que incluyera un parámetro de petición especialmente diseñado podría ser usada para redirigir al usuario a una página controlada por un atacante. • http://www.openwall.com/lists/oss-security/2022/01/17/2 https://lists.apache.org/thread/b7v5dkpyqb51nw0lvz4cybhgrfhk1g7j • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

This vulnerability allows local attackers to disclose sensitive information on affected installations of Samsung Knox 1.2.02.39 on Samsung Galaxy S9 build G9600ZHS3ARL1 Secure Folder. An attacker must first obtain physical access to the device in order to exploit this vulnerability. The specific flaws exists within the the handling of the lock screen for Secure Folder. The issue results from the lack of proper validation that a user has correctly authenticated. An attacker can leverage this vulnerability to disclose the contents of the secure container. • https://security.samsungmobile.com/securityUpdate.smsb https://www.zerodayinitiative.com/advisories/ZDI-19-515 • CWE-284: Improper Access Control CWE-287: Improper Authentication •

CVSS: 6.8EPSS: 0%CPEs: 10EXPL: 0

For versions of Apache Knox from 0.2.0 to 0.11.0 - an authenticated user may use a specially crafted URL to impersonate another user while accessing WebHDFS through Apache Knox. This may result in escalated privileges and unauthorized data access. While this activity is audit logged and can be easily associated with the authenticated user, this is still a serious security issue. All users are recommended to upgrade to the Apache Knox 0.12.0 release. Para versiones de Apache Knox desde 0.2.0 hasta 0.11.0, un usuario autenticado puede usar una URL especialmente diseñada para suplantar a otro usuario mientras accede a WebHDFS por medio de Apache Knox. • http://mail-archives.apache.org/mod_mbox/knox-user/201705.mbox/%3CCACRbFyjtT7QQGHUzTRdbJoySbJb7tt4BDk5-r-VRn0GB0Kgvag%40mail.gmail.com%3E http://www.securityfocus.com/bid/98739 https://lists.apache.org/thread.html/rcd6bcbcc08840d4e4bea661efe9a5ef8f6126ebbbc5bc266701d8f48%40%3Cdev.logging.apache.org%3E • CWE-346: Origin Validation Error •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

Samsung KNOX 1.0.0 uses the shared certificate on Android, which allows local users to conduct man-in-the-middle attacks as demonstrated by installing a certificate and running a VPN service. Samsung KNOX 1.0.0 utiliza el certificado compartido en Android, lo que permite a usuarios locales llevar a cabo ataques man-in-the-middle como se demuestra instalando un certificado y ejecutando un servicio VPN. • http://www.securityfocus.com/archive/1/537318/100/0/threaded http://www.securityfocus.com/archive/1/537339/100/0/threaded • CWE-284: Improper Access Control •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

ClipboardDataMgr in Samsung KNOX 1.0.0 and 2.3.0 does not properly check the caller, which allows local users to read KNOX clipboard data via a crafted application. ClipboardDataMgr en Samsung KNOX 1.0.0 y 2.3.0 no verifica adecuadamente a quien llama, lo que permite a usuarios locales leer datos de portapapeles de KNOX a través de una aplicación manipulada. KNOX versions 1.0 through 2.3 on Android suffer from a clipboard data disclosure vulnerability. • http://packetstormsecurity.com/files/136710/KNOX-2.3-Clipboard-Data-Disclosure.html http://www.securityfocus.com/archive/1/538113/100/0/threaded • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •