SSD Advisory – Cisco Prime Infrastructure File Inclusion and Remote Command Execution to Privileges Escalation

Vulnerabilities Summary Cisco Prime Infrastructure (CPI) contains two vulnerabilities that when exploited allow an unauthenticated attacker to achieve root privileges and execute code remotely. The first vulnerability is a file upload vulnerability tha… Continue reading SSD Advisory – Cisco Prime Infrastructure File Inclusion and Remote Command Execution to Privileges Escalation

SSD Advisory – Android Printing Man in the Middle Attack

Vulnerabilities Summary Android 8.1 has introduced the new feature of a default printing service. This service, based on the very similar, freely available Mopria Alliance Print Service on the Google Play Store, suffers from a lack of validation which … Continue reading SSD Advisory – Android Printing Man in the Middle Attack

SSD Advisory – IRDA Linux Driver UAF

Vulnerabilities Summary The following advisory describes two vulnerabilities in the Linux Kernel. By combining these two vulnerabilities a privilege escalation can be achieved. The two vulnerabilities are quite old and have been around for at least 17 … Continue reading SSD Advisory – IRDA Linux Driver UAF

SSD Advisory – ASUSTOR NAS Devices Authentication Bypass

Vulnerabilities Summary An ASUSTOR NAS or network attached storage is “a computer appliance built from the ground up for storing and serving files. It attaches directly to a network, allowing those on the network to access and share files from a … Continue reading SSD Advisory – ASUSTOR NAS Devices Authentication Bypass

SSD Advisory – CloudByte ElastiStor OS Unauthenticated Remote Code Execution

Vulnerabilities Summary The following advisory describes two vulnerabilities found in ElastiCenter, ElastiStor’s management console, File Injection that leads to unauthenticated remote code execution. ElastiCenter is the centralized management to… Continue reading SSD Advisory – CloudByte ElastiStor OS Unauthenticated Remote Code Execution

SSD Advisory – VirtualBox VRDP Guest-to-Host Escape

Vulnerability Summary VirtualBox has a built-in RDP server which provides access to a guest machine. While the RDP client sees the guest OS, the RDP server runs on the host OS. Therefore, to view the guest OS the RDP client will make a connection to th… Continue reading SSD Advisory – VirtualBox VRDP Guest-to-Host Escape

SSD Advisory – Linux Kernel AF_PACKET Use After Free (packet_sock)

Vulnerability Summary UAF vulnerability in Linux Kernel’s implementation of AF_PACKET leads to privilege escalation. AF_PACKET sockets allow users to send or receive packets on the device driver level, which lets them implement their own protocol… Continue reading SSD Advisory – Linux Kernel AF_PACKET Use After Free (packet_sock)

SSD Advisory – LINE Corporation URI Handlers Remote Commands Execution

Vulnerabilities Summary LINE for Windows provided by LINE Corporation specifies the path to read DLL when launching software. A user clicking on a specially crafted link, can use this vulnerability to cause the user to insecurely load an arbitrary DLL … Continue reading SSD Advisory – LINE Corporation URI Handlers Remote Commands Execution

SSD Advisory – phpMyAdmin File Inclusion and Remote Code Execution

Vulnerabilities Summary Authenticated users can exploit a file inclusion vulnerability in phpMyAdmin which can then be combined with another vulnerability, to perform Remote Code Execution. In addition, authnticated attackers can view files and execute… Continue reading SSD Advisory – phpMyAdmin File Inclusion and Remote Code Execution