An issue was discovered in SALTO ProAccess SPACE 5.4.3.0. The product's webserver runs as a Windows service with local SYSTEM permissions by default. This is against the principle of least privilege. An attacker who is able to exploit CVE-2019-19458 or CVE-2019-19459 is basically able to write to every single path on the file system, because the webserver is running with the highest privileges available.
References
Link | Resource |
---|---|
https://packetstormsecurity.com/files/155525/SALTO-ProAccess-SPACE-5.5-Traversal-File-Write-XSS-Bypass.html | Exploit Third Party Advisory VDB Entry |
https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-salto-proaccess-space/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2019-12-03 11:15
Updated : 2019-12-13 07:50
NVD link : CVE-2019-19460
Mitre link : CVE-2019-19460
JSON object : View
CWE
CWE-276
Incorrect Default Permissions
Products Affected
microsoft
- windows
saltosystem
- proaccess_space