You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The blog post outlines two vulnerabilities that would chain nicely into a Metasploit module.
CVE-2024-57727 an unauthenticated path traversal which allows an attacker to download arbitrary files in including config files containing passwords encrypted with a hardcoded key.
CVE-2024-57728 an authenticated file upload (zip slip) which results in code execution.
Summary
The blog post outlines two vulnerabilities that would chain nicely into a Metasploit module.
CVE-2024-57727 an unauthenticated path traversal which allows an attacker to download arbitrary files in including config files containing passwords encrypted with a hardcoded key.
CVE-2024-57728 an authenticated file upload (zip slip) which results in code execution.
Basic example
https://www.horizon3.ai/attack-research/disclosures/critical-vulnerabilities-in-simplehelp-remote-support-software/
The text was updated successfully, but these errors were encountered: