8 results (0.005 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

The component in (1) /luci/homebase and (2) /luci/cluster menu in Red Hat Conga 0.12.2 allows remote authenticated users to bypass intended access restrictions via a crafted URL. El componente en (1) /luci/homebase y (2) /luci/cluster menu en Red Hat Conga 0.12.2 permite a usuarios remotos autenticados evadir las restricciones de acceso a través de una URL manipulada. It was discovered that various components in the luci site extension-related URLs were not properly restricted to administrative users. A remote, authenticated attacker could escalate their privileges to perform certain actions that should be restricted to administrative users, such as adding users and systems, and viewing log data. • http://rhn.redhat.com/errata/RHSA-2014-1194.html https://bugzilla.redhat.com/show_bug.cgi?id=1112813 https://access.redhat.com/security/cve/CVE-2014-3521 • CWE-264: Permissions, Privileges, and Access Controls CWE-862: Missing Authorization •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Red Hat Conga 0.12.2 allows remote attackers to obtain sensitive information via a crafted request to the (1) homebase, (2) cluster, (3) storage, (4) portal_skins/custom, or (5) logs Luci extension. Red Hat Conga 0.12.2 permite a atacantes remotos obtener información sensible a través de una solicitud manipulada en la extensión (1) homebase, (2) cluster, (3) storage, (4) portal_skins/custom, o (5) logs Luci. Multiple information leak flaws were found in the way conga processed luci site extension-related URL requests. A remote, unauthenticated attacker could issue a specially crafted HTTP request that, when processed, would result in unauthorized information disclosure. • http://rhn.redhat.com/errata/RHSA-2014-1194.html https://bugzilla.redhat.com/show_bug.cgi?id=971541 https://access.redhat.com/security/cve/CVE-2013-6496 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 3.7EPSS: 0%CPEs: 2EXPL: 0

Luci in Red Hat Conga does not properly enforce the user session timeout, which might allow attackers to gain access to the session by reading the __ac session cookie. NOTE: this issue has been SPLIT due to different vulnerability types. Use CVE-2012-3359 for the base64-encoded storage of the user and password in a cookie. Luci en Red Hat Conga no fuerza debidamente el timeout de la sesión de usuario, lo que podría permitir a atacantes ganar acceso a la sesión mediante la lectura de la cookie de sesión __ac. NOTA: este problema ha sido dividido (SPLIT) debido a tipos de vulnerabilidad diferentes. • http://rhn.redhat.com/errata/RHSA-2013-0128.html https://bugzilla.redhat.com/show_bug.cgi?id=607179 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 3.7EPSS: 0%CPEs: 2EXPL: 0

Luci in Red Hat Conga stores the user's username and password in a Base64 encoded string in the __ac session cookie, which allows attackers to gain privileges by accessing this cookie. NOTE: this issue has been SPLIT due to different vulnerability types. Use CVE-2013-7347 for the incorrect enforcement of a user timeout. Luci en Red Hat Conga almacena el nombre de usuario y la contraseña del usuario en una cadena codificada en Base64 en la cookie de sesión __ac, lo que permite a atacantes ganar privilegios mediante el acceso a esta cookie. NOTA: este problema ha sido dividido (SPLIT) debido a tipos de vulnerabilidad diferentes. • http://rhn.redhat.com/errata/RHSA-2013-0128.html https://bugzilla.redhat.com/show_bug.cgi?id=607179 https://access.redhat.com/security/cve/CVE-2012-3359 • CWE-255: Credentials Management Errors •

CVSS: 7.5EPSS: 1%CPEs: 34EXPL: 0

Unspecified vulnerability in Plone 2.5 through 4.0, as used in Conga, luci, and possibly other products, allows remote attackers to obtain administrative access, read or create arbitrary content, and change the site skin via unknown vectors. Una vulnerabilidad no especificada en Plone versión 2.5 hasta 4.0, como se utiliza en Conga, luci, y posiblemente otros productos, permite a los atacantes remotos obtener acceso administrativo, leer o crear contenido arbitrario, y cambiar el aspecto del sitio por medio de vectores desconocidos. • http://osvdb.org/70753 http://plone.org/products/plone/security/advisories/cve-2011-0720 http://secunia.com/advisories/43146 http://secunia.com/advisories/43914 http://www.redhat.com/support/errata/RHSA-2011-0393.html http://www.redhat.com/support/errata/RHSA-2011-0394.html http://www.securityfocus.com/bid/46102 http://www.securitytracker.com/id?1025258 http://www.vupen.com/english/advisories/2011/0796 https://exchange.xforce.ibmcloud.com/vulnerabilities/65099 https://acce • CWE-284: Improper Access Control •