Relative path traversal in Druva inSync Windows Client 6.6.3 allows a local, unauthenticated attacker to execute arbitrary operating system commands with SYSTEM privileges.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2020-34 | Exploit Release Notes Third Party Advisory |
http://packetstormsecurity.com/files/157802/Druva-inSync-Windows-Client-6.6.3-Local-Privilege-Escalation.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/160404/Druva-inSync-Windows-Client-6.6.3-Privilege-Escalation.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2020-05-21 08:15
Updated : 2022-11-28 18:16
NVD link : CVE-2020-5752
Mitre link : CVE-2020-5752
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
druva
- insync_client