COMPAREX Miss Marple Enterprise Edition before 2.0 allows local users to execute arbitrary code by reading the user name and encrypted password hard-coded in an Inventory Agent configuration file.
References
| Link | Resource |
|---|---|
| http://packetstormsecurity.com/files/150427/Miss-Marple-Enterprise-Edition-File-Upload-Hardcoded-AES-Key.html | Third Party Advisory VDB Entry |
| http://seclists.org/fulldisclosure/2018/Nov/55 | Mailing List Third Party Advisory |
| https://seclists.org/bugtraq/2018/Nov/37 | Mailing List Third Party Advisory |
| https://www.sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-miss-marple-enterprise-edition/ | Third Party Advisory |
| http://packetstormsecurity.com/files/150427/Miss-Marple-Enterprise-Edition-File-Upload-Hardcoded-AES-Key.html | Third Party Advisory VDB Entry |
| http://seclists.org/fulldisclosure/2018/Nov/55 | Mailing List Third Party Advisory |
| https://seclists.org/bugtraq/2018/Nov/37 | Mailing List Third Party Advisory |
| https://www.sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-miss-marple-enterprise-edition/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:57
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://packetstormsecurity.com/files/150427/Miss-Marple-Enterprise-Edition-File-Upload-Hardcoded-AES-Key.html - Third Party Advisory, VDB Entry | |
| References | () http://seclists.org/fulldisclosure/2018/Nov/55 - Mailing List, Third Party Advisory | |
| References | () https://seclists.org/bugtraq/2018/Nov/37 - Mailing List, Third Party Advisory | |
| References | () https://www.sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-miss-marple-enterprise-edition/ - Third Party Advisory |
Information
Published : 2018-12-20 17:29
Updated : 2024-11-21 03:57
NVD link : CVE-2018-19233
Mitre link : CVE-2018-19233
CVE.ORG link : CVE-2018-19233
JSON object : View
Products Affected
comparex
- miss_marple
CWE
CWE-798
Use of Hard-coded Credentials
