Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on July 27th, 2019 📆 | 5883 Views ⚑

0

Ahsay Cloud Backup Suite prior 8.1.1.50 File Explorer ShowAdvanced.do directory traversal


iSpeech

CVSS Meta Temp Score Current Exploit Price (β‰ˆ)
5.3 $0-$5k

A vulnerability was found in Ahsay Cloud Backup Suite (Backup Software). It has been classified as critical. Affected is some unknown processing of the file /cbs/system/ShowAdvanced.do of the component File Explorer. The manipulation with an unknown input leads to a directory traversal vulnerability. CWE is classifying the issue as CWE-22. This is going to have an impact on confidentiality, integrity, and availability.

The weakness was presented 07/26/2019. This vulnerability is traded as CVE-2019-10265 since 03/28/2019. Technical details are known, but there is no available exploit.

Upgrading to version 8.1.1.50 eliminates this vulnerability.

See 138860, 138859, 138857 and 138856 for similar entries.

Type

Vendor

Name

VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.3

VulDB Base Score: β‰ˆ5.5
VulDB Temp Score: β‰ˆ5.3
VulDB Vector: πŸ”’
VulDB Reliability: πŸ”

VulDB Base Score: πŸ”’
VulDB Temp Score: πŸ”’
VulDB Reliability: πŸ”
Class: Directory traversal (CWE-22)
Local: Yes
Remote: No





Availability: πŸ”’
Status: Not defined

Price Prediction: πŸ”
Current Price Estimation: πŸ”’


0-Day unlock unlock unlock unlock
Today unlock unlock unlock unlock

Threat Intelligenceinfoedit

Threat: πŸ”
Adversaries: πŸ”
Geopolitics: πŸ”
Economy: πŸ”
Predictions: πŸ”
Remediation: πŸ”Recommended: Upgrade
Status: πŸ”

0-Day Time: πŸ”’

Upgrade: Cloud Backup Suite 8.1.1.50

03/28/2019 CVE assigned
07/26/2019 +120 days Advisory disclosed
07/27/2019 +1 days VulDB entry created
07/27/2019 +0 days VulDB last update
CVE: CVE-2019-10265 (πŸ”’)
See also: πŸ”’Created: 07/27/2019 01:40 PM
Complete: πŸ”

Download it now for free!

https://vuldb.com/?id.138858

Tagged with: β€’ β€’ β€’ β€’ β€’ β€’



Comments are closed.