CVE-2024-4465 – Incorrect authorization for Reports configuration in Guardian/CMC before 24.2.0
https://notcve.org/view.php?id=CVE-2024-4465
An access control vulnerability was discovered in the Reports section due to a specific access restriction not being properly enforced for users with limited privileges. If a logged-in user with reporting privileges learns how to create a specific application request, they might be able to make limited changes to the reporting configuration. This could result in a partial loss of data integrity. In Guardian/CMC instances with a reporting configuration, there could be limited Denial of Service (DoS) impacts, as the reports may not reach their intended destination, and there could also be limited information disclosure impacts. Furthermore, modifying the destination SMTP server for the reports could lead to the compromise of external credentials, as they might be sent to an unauthorized server. An access control vulnerability was discovered in the Reports section due to a specific access restriction not being properly enforced for users with limited privileges. If a logged-in user with reporting privileges learns how to create a specific application request, they might be able to make limited changes to the reporting configuration. • https://security.nozominetworks.com/NN-2024:2-01 • CWE-863: Incorrect Authorization •
CVE-2023-5938 – Path traversal via 'zip slip' in Arc before v1.6.0
https://notcve.org/view.php?id=CVE-2023-5938
Multiple functions use archives without properly validating the filenames therein, rendering the application vulnerable to path traversal via 'zip slip' attacks. An administrator able to provide tampered archives to be processed by the affected versions of Arc may be able to have arbitrary files extracted to arbitrary filesystem locations. Leveraging this issue, an attacker may be able to overwrite arbitrary files on the target filesystem and cause critical impacts on the system (e.g., arbitrary command execution on the victim’s machine). Múltiples funciones utilizan archivos sin validar adecuadamente los nombres de los mismos, lo que hace que la aplicación sea vulnerable al path traversal mediante ataques de "deslizamiento zip". Un administrador capaz de proporcionar archivos manipulados para que sean procesados por las versiones afectadas de Arc puede extraer archivos arbitrarios en ubicaciones arbitrarias del sistema de archivos. Aprovechando este problema, un atacante puede sobrescribir archivos arbitrarios en el sistema de archivos de destino y causar impactos críticos en el sistema (por ejemplo, ejecución de comandos arbitrarios en la máquina de la víctima). • https://security.nozominetworks.com/NN-2023:16-01 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2023-5937 – Sensitive data exfiltration via unsafe permissions on Windows systems in Arc before v1.6.0
https://notcve.org/view.php?id=CVE-2023-5937
On Windows systems, the Arc configuration files resulted to be world-readable. This can lead to information disclosure by local attackers, via exfiltration of sensitive data from configuration files. En los sistemas Windows, los archivos de configuración de Arc resultaron ser legibles en todo el mundo. Esto puede dar lugar a la divulgación de información por parte de atacantes locales, mediante la filtración de datos confidenciales de los archivos de configuración. • https://security.nozominetworks.com/NN-2023:15-01 • CWE-538: Insertion of Sensitive Information into Externally-Accessible File or Directory CWE-732: Incorrect Permission Assignment for Critical Resource •
CVE-2023-5936 – Unsafe temporary data privileges on Unix systems in Arc before v1.6.0
https://notcve.org/view.php?id=CVE-2023-5936
On Unix systems (Linux, MacOS), Arc uses a temporary file with unsafe privileges. By tampering with such file, a malicious local user in the system may be able to trigger arbitrary code execution with root privileges. En sistemas Unix (Linux, MacOS), Arc utiliza un archivo temporal con privilegios inseguros. Al alterar dicho archivo, un usuario local malicioso en el sistema puede desencadenar la ejecución de código arbitrario con privilegios de root. • https://security.nozominetworks.com/NN-2023:14-01 • CWE-732: Incorrect Permission Assignment for Critical Resource •
CVE-2023-5935 – Missing authentication for local web interface in Arc before v1.6.0
https://notcve.org/view.php?id=CVE-2023-5935
When configuring Arc (e.g. during the first setup), a local web interface is provided to ease the configuration process. Such web interface lacks authentication and may thus be abused by a local attacker or malware running on the machine itself. A malicious local user or process, during a window of opportunity when the local web interface is active, may be able to extract sensitive information or change Arc's configuration. This could also lead to arbitrary code execution if a malicious update package is installed. Al configurar Arc (por ejemplo, durante la primera configuración), se proporciona una interfaz web local para facilitar el proceso de configuración. Dicha interfaz web carece de autenticación y, por lo tanto, un atacante local o un malware que se ejecuta en la propia máquina pueden abusar de ella. • https://security.nozominetworks.com/NN-2023:13-01 • CWE-306: Missing Authentication for Critical Function •