Sage

Sage 300

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 16.05.2023 20:15:09
  • Zuletzt bearbeitet 23.01.2025 17:15:08

Versions of Sage 300 through 2022 implement role-based access controls that are only enforced client-side. Low-privileged Sage users, particularly those on a workstation setup in the "Windows Peer-to-Peer Network" or "Client Server Network" Sage 300 ...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 28.04.2023 13:15:13
  • Zuletzt bearbeitet 31.01.2025 18:15:30

On versions of Sage 300 2017 - 2022 (6.4.x - 6.9.x) which are setup in a "Windows Peer-to-Peer Network" or "Client Server Network" configuration, a low-privileged Sage 300 workstation user could abuse their access to the "SharedData" folder on the co...

  • EPSS 0.07%
  • Veröffentlicht 28.04.2023 13:15:13
  • Zuletzt bearbeitet 31.01.2025 18:15:30

The optional Web Screens and Global Search features for Sage 300 through version 2022 use a hard-coded 40-byte blowfish key ("LandlordPassKey") to encrypt and decrypt secrets stored in configuration files and in database tables.

  • EPSS 0.07%
  • Veröffentlicht 28.04.2023 13:15:13
  • Zuletzt bearbeitet 31.01.2025 17:15:09

The optional Global Search feature for Sage 300 through version 2022 uses a set of hard-coded credentials for the accompanying Apache Solr instance. This issue could allow attackers to login to the Solr dashboard with admin privileges and access sens...

  • EPSS 0.07%
  • Veröffentlicht 28.04.2023 13:15:13
  • Zuletzt bearbeitet 31.01.2025 17:15:09

The optional Web Screens feature for Sage 300 through version 2022 uses a hard-coded 40-byte blowfish key ("PASS_KEY") to encrypt and decrypt the database connection string for the PORTAL database found in the "dbconfig.xml". This issue could allow a...

  • EPSS 0.07%
  • Veröffentlicht 28.04.2023 13:15:13
  • Zuletzt bearbeitet 30.01.2025 21:15:09

Sage 300 through 2022 uses a hard-coded 40-byte blowfish key to encrypt and decrypt user passwords and SQL connection strings stored in ISAM database files in the shared data directory. This issue could allow attackers to decrypt user passwords and S...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 14.07.2022 16:15:08
  • Zuletzt bearbeitet 21.11.2024 06:32:19

In Sage 300 ERP (formerly accpac) through 6.8.x, the installer configures the C:\Sage\Sage300\Runtime directory to be the first entry in the system-wide PATH environment variable. However, this directory is writable by unprivileged users because the ...