fkie_cve-2019-16382
Vulnerability from fkie_nvd
Published
2020-03-19 17:15
Modified
2024-11-21 04:30
Severity ?
Summary
An issue was discovered in Ivanti Workspace Control 10.3.110.0. One is able to bypass Ivanti's FileGuard folder protection by renaming the WMTemp work folder used by PowerGrid. A malicious PowerGrid XML file can then be created, after which the folder is renamed back to its original value. Also, CVE-2018-15591 exploitation can consequently be achieved by using PowerGrid with the /SEE parameter to execute the arbitrary command specified in the XML file.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://forums.ivanti.com/s/article/Security-Alert-Ivanti-Workspace-Control-September-2019 | Patch, Vendor Advisory | |
cve@mitre.org | https://twitter.com/jmoosdijk | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://forums.ivanti.com/s/article/Security-Alert-Ivanti-Workspace-Control-September-2019 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://twitter.com/jmoosdijk | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | workspace_control | 10.3.110.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ivanti:workspace_control:10.3.110.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC08C246-7F5C-4745-8F17-AA6236BC65B6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Ivanti Workspace Control 10.3.110.0. One is able to bypass Ivanti\u0027s FileGuard folder protection by renaming the WMTemp work folder used by PowerGrid. A malicious PowerGrid XML file can then be created, after which the folder is renamed back to its original value. Also, CVE-2018-15591 exploitation can consequently be achieved by using PowerGrid with the /SEE parameter to execute the arbitrary command specified in the XML file." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Ivanti Workspace Control versi\u00f3n 10.3.110.0. Uno es capaz de omitir la protecci\u00f3n de la carpeta FileGuard de Ivanti al renombrar la carpeta de trabajo WMTemp usada por PowerGrid. Un archivo XML de PowerGrid malicioso puede entonces ser creado, despu\u00e9s de que la carpeta cambia de nombre a su valor original. Adem\u00e1s, una explotaci\u00f3n de CVE-2018-15591 puede ser lograda en consecuencia utilizando PowerGrid con el par\u00e1metro /SEE para ejecutar el comando arbitrario especificado en el archivo XML." } ], "id": "CVE-2019-16382", "lastModified": "2024-11-21T04:30:36.233", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-19T17:15:12.890", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://forums.ivanti.com/s/article/Security-Alert-Ivanti-Workspace-Control-September-2019" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://twitter.com/jmoosdijk" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://forums.ivanti.com/s/article/Security-Alert-Ivanti-Workspace-Control-September-2019" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://twitter.com/jmoosdijk" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…