An issue was discovered in SALTO ProAccess SPACE 5.4.3.0. The product's webserver runs as a Windows service with local SYSTEM permissions by default. This is against the principle of least privilege. An attacker who is able to exploit CVE-2019-19458 or CVE-2019-19459 is basically able to write to every single path on the file system, because the webserver is running with the highest privileges available.
References
Link | Resource |
---|---|
https://packetstormsecurity.com/files/155525/SALTO-ProAccess-SPACE-5.5-Traversal-File-Write-XSS-Bypass.html | Exploit Third Party Advisory VDB Entry |
https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-salto-proaccess-space/ | Exploit Third Party Advisory |
https://packetstormsecurity.com/files/155525/SALTO-ProAccess-SPACE-5.5-Traversal-File-Write-XSS-Bypass.html | Exploit Third Party Advisory VDB Entry |
https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-salto-proaccess-space/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://packetstormsecurity.com/files/155525/SALTO-ProAccess-SPACE-5.5-Traversal-File-Write-XSS-Bypass.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-salto-proaccess-space/ - Exploit, Third Party Advisory |
Information
Published : 2019-12-03 19:15
Updated : 2024-11-21 04:34
NVD link : CVE-2019-19460
Mitre link : CVE-2019-19460
CVE.ORG link : CVE-2019-19460
JSON object : View
Products Affected
saltosystem
- proaccess_space
microsoft
- windows
CWE
CWE-276
Incorrect Default Permissions