Sapphireims

Sapphireims

11 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.05%
  • Veröffentlicht 11.08.2021 21:15:08
  • Zuletzt bearbeitet 21.11.2024 05:18:07

SapphireIMS 5 utilized default sapphire:ims credentials to connect the client to server. This credential is saved in ServerConf.config file in the client.

Exploit
  • EPSS 0.12%
  • Veröffentlicht 11.08.2021 21:15:08
  • Zuletzt bearbeitet 21.11.2024 05:18:07

In SapphireIMS 5.0, there is no CSRF token present in the entire application. This can lead to CSRF vulnerabilities in critical application forms like account resent.

Exploit
  • EPSS 0.38%
  • Veröffentlicht 11.08.2021 21:15:08
  • Zuletzt bearbeitet 21.11.2024 05:18:07

In SapphireIMS 5.0, it is possible to create local administrator on any client without requiring any credentials by directly accessing RemoteMgmtTaskSave (Automation Tasks) feature and not having a JSESSIONID.

Exploit
  • EPSS 0.31%
  • Veröffentlicht 11.08.2021 21:15:08
  • Zuletzt bearbeitet 21.11.2024 05:18:08

In SapphireIMS 5.0, it is possible to create local administrator on any client with credentials of a non-privileged user by directly accessing RemoteMgmtTaskSave (Automation Tasks) feature.

Exploit
  • EPSS 0.87%
  • Veröffentlicht 11.08.2021 21:15:08
  • Zuletzt bearbeitet 21.11.2024 05:18:08

In SapphireIMS 5.0, it is possible to use the hardcoded credential in clients (username: sapphire, password: ims) and gain access to the portal. Once the access is available, the attacker can inject malicious OS commands on “ping”, “traceroute” and “...

Exploit
  • EPSS 0.38%
  • Veröffentlicht 11.08.2021 21:15:08
  • Zuletzt bearbeitet 21.11.2024 05:18:08

In SapphireIMS 5.0, it is possible to take over an account by sending a request to the Save_Password form as shown in POC. Notice that we do not require a JSESSIONID in this request and can reset any user’s password by changing the username to that u...

  • EPSS 0.34%
  • Veröffentlicht 11.08.2021 21:15:07
  • Zuletzt bearbeitet 21.11.2024 03:16:42

In SapphireIMS 4097_1, it is possible to guess the registered/active usernames of the software from the errors it gives out for each type of user on the Login form. For "Incorrect User" - it gives an error "The application failed to identify the user...

  • EPSS 0.32%
  • Veröffentlicht 11.08.2021 21:15:07
  • Zuletzt bearbeitet 21.11.2024 03:16:42

In SapphireIMS 4097_1, a guest user can create a local administrator account on any system that has SapphireIMS installed, because of an Insecure Direct Object Reference (IDOR) in the local user creation function.

  • EPSS 0.15%
  • Veröffentlicht 11.08.2021 21:15:07
  • Zuletzt bearbeitet 21.11.2024 03:16:43

In SapphireIMS 4097_1, a guest user is able to change the password of an administrative user by utilizing an Insecure Direct Object Reference (IDOR) in the "Account Password Reset" functionality.

  • EPSS 0.15%
  • Veröffentlicht 11.08.2021 21:15:07
  • Zuletzt bearbeitet 21.11.2024 03:16:43

In SapphireIMS 4097_1, the password in the database is stored in Base64 format.