Vulnerability CVE-2017-9812


Published: 2017-07-17   Modified: 2017-07-18

Description:
The reportId parameter of the getReportStatus action method can be abused in the web interface in Kaspersky Anti-Virus for Linux File Server before Maintenance Pack 2 Critical Fix 4 (version 8.0.4.312) to read arbitrary files with kluser privileges.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Kaspersky Anti-Virus File Server 8.0.3.297 - Multiple Vulnerabilities
CORE
29.06.2017
Med.
Kaspersky Anti-Virus File Server 8.0.3.297 XSS / CSRF / Code Execution
CORE
29.06.2017

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Kaspersky -> Anti-virus for linux server 

 References:
http://packetstormsecurity.com/files/143190/Kaspersky-Anti-Virus-File-Server-8.0.3.297-XSS-CSRF-Code-Execution.html
http://seclists.org/fulldisclosure/2017/Jun/33
http://www.securityfocus.com/bid/99330
http://www.securitytracker.com/id/1038798
https://www.coresecurity.com/advisories/kaspersky-anti-virus-file-server-multiple-vulnerabilities

Copyright 2024, cxsecurity.com

 

Back to Top