CVE-2021-44674
https://notcve.org/view.php?id=CVE-2021-44674
An information exposure issue has been discovered in Opmantek Open-AudIT 4.2.0. The vulnerability allows an authenticated attacker to read file outside of the restricted directory. Se ha detectado un problema de exposición de información en Opmantek Open-AudIT versión 4.2.0. La vulnerabilidad permite a un atacante autenticado leer archivos fuera del directorio restringido • http://open-audit.com http://opmantek.com https://community.opmantek.com/display/OA/Release+Notes+for+Open-AudIT+v4.3.0 https://github.com/Opmantek/open-audit/commit/d27b649283aa6a01a15e5a3df1520d7aa69a5e18 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2021-40612
https://notcve.org/view.php?id=CVE-2021-40612
An issue was discovered in Opmantek Open-AudIT after 3.5.0. Without authentication, a vulnerability in code_igniter/application/controllers/util.php allows an attacker perform command execution without echoes. Se ha detectado un problema en Opmantek Open-AudIT después de la versión 3.5.0. Sin autenticación, una vulnerabilidad en el archivo code_igniter/application/controllers/util.php permite a un atacante llevar a cabo una ejecución de comandos sin eco • https://community.opmantek.com/pages/viewpage.action?pageId=65504438 https://github.com/Opmantek/open-audit/commit/c7595cbb092e410a487f03c0eb536cf19e538860 •
CVE-2021-44916 – Open-AudIT Community 4.2.0 - Cross-Site Scripting (XSS) (Authenticated)
https://notcve.org/view.php?id=CVE-2021-44916
Opmantek Open-AudIT Community 4.2.0 (Fixed in 4.3.0) is affected by a Cross Site Scripting (XSS) vulnerability. If a bad value is passed to the routine via a URL, malicious JavaScript code can be executed in the victim's browser. Opmantek Open-AudIT Community versión 4.2.0 (Corregido en versión 4.3.0) está afectado por una vulnerabilidad de tipo Cross Site Scripting (XSS). Si es pasado un valor incorrecto a la rutina por medio de una URL, puede ejecutarse código JavaScript malicioso en el navegador de la víctima Open-AudIT Community versions 4.2.0 and below suffer from a cross site scripting vulnerability. • https://www.exploit-db.com/exploits/50651 http://packetstormsecurity.com/files/165502/Open-AudIT-Community-4.2.0-Cross-Site-Scripting.html https://community.opmantek.com/display/OA/Errata+-+4.2.0+and+earlier+Javascript+vulnerability https://community.opmantek.com/display/OA/Release+Notes+for+Open-AudIT+v4.3.0 https://github.com/Opmantek/open-audit/commit/e37b64bbd0219f03cb71cc1cd5bb010166a2b846 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2021-3333
https://notcve.org/view.php?id=CVE-2021-3333
Opmantek Open-AudIT 4.0.1 is affected by cross-site scripting (XSS). When outputting SQL statements for debugging, a maliciously crafted query can trigger an XSS attack. This attack only succeeds if the user is already logged in to Open-AudIT before they click the malicious link. Opmantek Open-AudIT versión 4.0.1, está afectado por una vulnerabilidad de tipo cross-site scripting. Al generar sentencias SQL para depuración, una consulta diseñada con fines maliciosos puede desencadenar un ataque de tipo XSS. • https://community.opmantek.com/display/OA/Errata+-+4.0.1+XSS+in+SQL+debugging+output • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2021-3130
https://notcve.org/view.php?id=CVE-2021-3130
Within the Open-AudIT up to version 3.5.3 application, the web interface hides SSH secrets, Windows passwords, and SNMP strings from users using HTML 'password field' obfuscation. By using Developer tools or similar, it is possible to change the obfuscation so that the credentials are visible. Dentro de la aplicación Open-AudIT hasta la versión 3.5.3, la interfaz web oculta los secretos SSH, las contraseñas de Windows y las cadenas SNMP de los usuarios que usan la ofuscación del HTML "password field". Mediante el uso de herramientas del Desarrollador o similar, es posible cambiar la ofuscación para que las credenciales sean visibles • https://github.com/jet-pentest/CVE-2021-3130 https://opmantek.com/network-discovery-inventory-software https://raw.githubusercontent.com/B0D0B0P0T/CVE/main/CVE-2021-3130 •