sage sage_300 对搜索路径元素未加控制

admin 2023-11-30 06:51:05 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
sage sage_300 对搜索路径元素未加控制

CVE编号

CVE-2021-45492

利用情况

暂无

补丁情况

N/A

披露时间

2022-07-15
漏洞描述
In Sage 300 ERP (formerly accpac) through 6.8.x, the installer configures the C:\Sage\Sage300\Runtime directory to be the first entry in the system-wide PATH environment variable. However, this directory is writable by unprivileged users because the Sage installer fails to set explicit permissions and therefore inherits weak permissions from the C:\ folder. Because entries in the system-wide PATH variable are included in the search order for DLLs, an attacker could perform DLL search-order hijacking to escalate their privileges to SYSTEM. Furthermore, if the Global Search or Web Screens functionality is enabled, then privilege escalation is possible via the GlobalSearchService and Sage.CNA.WindowsService services, again via DLL search-order hijacking because unprivileged users would have modify permissions on the application directory. Note that while older versions of the software default to installing in %PROGRAMFILES(X86)% (which would allow the Sage folder to inherit strong permissions, making the installation not vulnerable), the official Sage 300 installation guides for those versions recommend installing in C:\Sage, which would make the installation vulnerable.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://controlgap.com/blog?tag=insecurity
https://www.controlgap.com/blog/sage-300-case-study
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 sage sage_300 * Up to (including) 2022
CVSS3评分 7.8
  • 攻击路径 本地
  • 攻击复杂度 低
  • 权限要求 低
  • 影响范围 未更改
  • 用户交互 无
  • 可用性 高
  • 保密性 高
  • 完整性 高
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-ID 漏洞类型
CWE-427 对搜索路径元素未加控制
CWE-732 关键资源的不正确权限授予
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0