In order to perform actions that requires higher privileges, the Quest KACE System Management Appliance 8.0.318 relies on a message queue managed that runs with root privileges and only allows a set of commands. One of the available commands allows changing any user's password (including root). A low-privilege user could abuse this feature by changing the password of the 'kace_support' account, which comes disabled by default but has full sudo privileges.
References
Link | Resource |
---|---|
https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities | Exploit Technical Description Third Party Advisory |
Configurations
Information
Published : 2018-05-31 11:29
Updated : 2018-06-29 11:50
NVD link : CVE-2018-11134
Mitre link : CVE-2018-11134
JSON object : View
CWE
CWE-640
Weak Password Recovery Mechanism for Forgotten Password
Products Affected
quest
- kace_system_management_appliance