10 results (0.004 seconds)

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

01 Feb 2024 — ConnectWise ScreenConnect through 23.8.4 allows local users to connect to arbitrary relay servers via implicit trust of proxy settings ConnectWise ScreenConnect hasta 23.8.4 permite a los usuarios locales conectarse a servidores de retransmisión arbitrarios mediante la confianza implícita en la configuración del proxy • https://web.archive.org/web/20240208140218/https://gotham-security.com/screenconnect-cve-2023-47256 • CWE-287: Improper Authentication •

CVSS: 8.1EPSS: 1%CPEs: 2EXPL: 0

01 Feb 2024 — ConnectWise ScreenConnect through 23.8.4 allows man-in-the-middle attackers to achieve remote code execution via crafted messages. ConnectWise ScreenConnect hasta la versión 23.8.4 permite a atacantes de man in the middle lograr la ejecución remota de código a través de mensajes manipulados. • https://web.archive.org/web/20240208140218/https://gotham-security.com/screenconnect-cve-2023-47256 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 1

01 Feb 2023 — Connectwise Automate 2022.11 is vulnerable to Clickjacking. The login screen can be iframed and used to manipulate users to perform unintended actions. NOTE: the vendor's position is that a Content-Security-Policy HTTP response header is present to block this attack. • https://github.com/l00neyhacker/CVE-2023-23126 • CWE-1021: Improper Restriction of Rendered UI Layers or Frames •

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 1

01 Feb 2023 — Connectwise Automate 2022.11 is vulnerable to Cleartext authentication. Authentication is being done via HTTP (cleartext) with SSL disabled. OTE: the vendor's position is that, by design, this is controlled by a configuration option in which a customer can choose to use HTTP (rather than HTTPS) during troubleshooting. • https://github.com/l00neyhacker/CVE-2023-23130 • CWE-319: Cleartext Transmission of Sensitive Information •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

21 Jun 2021 — An XXE vulnerability exists in ConnectWise Automate before 2021.0.6.132. Se presenta una vulnerabilidad de tipo XXE en ConnectWise Automate versiones anteriores a 2021.0.6.132 • https://home.connectwise.com/securityBulletin/60cc8c63508a120001cb6e8d • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

17 Jun 2021 — An issue was discovered in ConnectWise Automate before 2021.5. A blind SQL injection vulnerability exists in core agent inventory communication that can enable an attacker to extract database information or administrative credentials from an instance via crafted monitor status responses. Se ha detectado un problema en ConnectWise Automate versiones anteriores a 2021.5. Se presenta una vulnerabilidad de inyección SQL ciega en la comunicación del inventario del agente principal que puede permitir a un atacant... • https://home.connectwise.com/securityBulletin/609a9dd75cb8450001e85369 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

09 Oct 2020 — The Agent Update System in ConnectWise Automate before 2020.8 allows Privilege Escalation because the _LTUPDATE folder has weak permissions. El Agent Update System en ConnectWise Automate versiones anteriores a 2020.8, permite una Escalada de Privilegios porque la carpeta _LTUPDATE presenta permisos débiles • https://dbeta.com/2020/10/05/PrivilegeEscalationInAutomateAgent • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

16 Jul 2020 — ConnectWise Automate through 2020.x has insufficient validation on certain authentication paths, allowing authentication bypass via a series of attempts. This was patched in 2020.7 and in a hotfix for 2019.12. ConnectWise Automate versiones hasta 2020.x, presenta una comprobación insuficiente en determinadas rutas de autenticación, permitiendo una omisión de autenticación por medio de una serie de intentos. Esto fue parcheado en versión 2020.7 y en una revisión para la versión 2019.12 • https://slagle.tech/2020/07/06/cve-2020-15027 • CWE-287: Improper Authentication •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

07 Jul 2020 — A SQLi exists in the probe code of all Connectwise Automate versions before 2020.7 or 2019.12. A SQL Injection in the probe implementation to save data to a custom table exists due to inadequate server side validation. As the code creates dynamic SQL for the insert statement and utilizes the user supplied table name with little validation, the table name can be modified to allow arbitrary update commands to be run. Usage of other SQL injection techniques such as timing attacks, it is possible to perform ful... • https://slagle.tech/2020/07/06/cve-2020-15008 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 6EXPL: 0

15 Jun 2020 — By using an Automate API in ConnectWise Automate before 2020.5.178, a remote authenticated user could execute commands and/or modifications within an individual Automate instance by triggering an SQL injection vulnerability in /LabTech/agent.aspx. This affects versions before 2019.12.337, 2020 before 2020.1.53, 2020.2 before 2020.2.85, 2020.3 before 2020.3.114, 2020.4 before 2020.4.143, and 2020.5 before 2020.5.178. Al usar una API de Automate en ConnectWise Automate versiones anteriores a 2020.5.178, un us... • https://www.connectwise.com/company/trust#tab1 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •