3 results (0.007 seconds)

CVSS: 9.9EPSS: 0%CPEs: 2EXPL: 0

The ITarian platform (SAAS / on-premise) offers the possibility to run code on agents via a function called procedures. It is possible to require a mandatory approval process. Due to a vulnerability in the approval process, present in any version prior to 6.35.37347.20040, a malicious actor (with a valid session token) can create a procedure, bypass approval, and execute the procedure. This results in the ability for any user with a valid session token to perform arbitrary code execution and full system take-over on all agents. La plataforma ITarian (SAAS / on-premise) ofrece la posibilidad de ejecutar código en los agentes por medio de una función llamada procedimientos. • https://csirt.divd.nl/CVE-2022-25152 https://csirt.divd.nl/DIVD-2021-00037 • CWE-358: Improperly Implemented Security Check for Standard •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Within the Service Desk module of the ITarian platform (SAAS and on-premise), a remote attacker can obtain sensitive information, caused by the failure to set the HTTP Only flag. A remote attacker could exploit this vulnerability to gain access to the management interface by using this vulnerability in combination with a successful Cross-Site Scripting attack on a user. Dentro del módulo Service Desk de la plataforma ITarian (SAAS y on-premise), un atacante remoto puede conseguir información confidencial, causada por el fallo en la configuración del flag HTTP Only. Un atacante remoto podría explotar esta vulnerabilidad para conseguir acceso a la interfaz de administración al usar esta vulnerabilidad en combinación con un ataque con éxito de tipo Cross-Site Scripting a un usuario • https://csirt.divd.nl/CVE-2022-25151 https://csirt.divd.nl/DIVD-2021-00037 • CWE-614: Sensitive Cookie in HTTPS Session Without 'Secure' Attribute CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

The ITarian Endpoint Manage Communication Client, prior to version 6.43.41148.21120, is compiled using insecure OpenSSL settings. Due to this setting, a malicious actor with low privileges access to a system can escalate his privileges to SYSTEM abusing an insecure openssl.conf lookup. El cliente de comunicación de ITarian Endpoint Manage, versiones anteriores a 6.43.41148.21120, es compilado usando una configuración no segura de OpenSSL. Debido a esta configuración, un actor malicioso con acceso de bajos privilegios a un sistema puede escalar sus privilegios a SYSTEM abusando de una búsqueda no segura de openssl.conf • https://csirt.divd.nl/CVE-2022-25153 https://csirt.divd.nl/DIVD-2021-00037 • CWE-275: Permission Issues •