4 results (0.004 seconds)

CVSS: 5.4EPSS: 0%CPEs: 2EXPL: 1

22 Jul 2021 — Sage X3 Stored XSS Vulnerability on ‘Edit’ Page of User Profile. An authenticated user can pass XSS strings the "First Name," "Last Name," and "Email Address" fields of this web application component. Updates are available for on-premises versions of Version 12 (components shipped with Syracuse 12.10.0 and later) of Sage X3. Other on-premises versions of Sage X3 are unaffected or unsupported by the vendor. Una Vulnerabilidad de tipo XSS almacenado en Sage X3 en la página "Editar" del perfil de usuario. • https://rapid7.com/blog/post/2021/07/07/sage-x3-multiple-vulnerabilities-fixed • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.0EPSS: 0%CPEs: 6EXPL: 1

22 Jul 2021 — Sage X3 System CHAINE Variable Script Command Injection. An authenticated user with developer access can pass OS commands via this variable used by the web application. Note, this developer configuration should not be deployed in production. Una Inyección de Comandos de la Variable CHAINE del Sistema en Sage X3. Un usuario autenticado con acceso de desarrollador puede pasar comandos del sistema operativo por medio de esta variable usada por la aplicación web. • https://rapid7.com/blog/post/2021/07/07/sage-x3-multiple-vulnerabilities-fixed • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE-306: Missing Authentication for Critical Function •

CVSS: 10.0EPSS: 19%CPEs: 5EXPL: 2

21 Jul 2021 — Sage X3 Unauthenticated Remote Command Execution (RCE) as SYSTEM in AdxDSrv.exe component. By editing the client side authentication request, an attacker can bypass credential validation. While exploiting this does require knowledge of the installation path, that information can be learned by exploiting CVE-2020-7387. This issue was fixed in AdxAdmin 93.2.53, which ships with updates for on-premises versions of Sage X3 including Version 9 (components shipped with Syracuse 9.22.7.2 and later), Sage X3 HR & P... • https://github.com/ac3lives/sagex3-cve-2020-7388-poc • CWE-290: Authentication Bypass by Spoofing •

CVSS: 5.3EPSS: 0%CPEs: 5EXPL: 1

21 Jul 2021 — Sage X3 Installation Pathname Disclosure. A specially crafted packet can elicit a response from the AdxDSrv.exe component that reveals the installation directory of the product. Note that this vulnerability can be combined with CVE-2020-7388 to achieve full RCE. This issue was fixed in AdxAdmin 93.2.53, which ships with updates for on-premises versions of Sage X3 Version 9 (components shipped with Syracuse 9.22.7.2 and later), Sage X3 HR & Payroll Version 9 (those components that ship with Syracuse 9.24.1.3... • https://rapid7.com/blog/post/2021/07/07/sage-x3-multiple-vulnerabilities-fixed • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •