Rukovoditel

Rukovoditel

52 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.67%
  • Veröffentlicht 27.04.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 04:58:42

In Rukovoditel 2.5.2, users' passwords and usernames are stored in a cookie with URL encoding, base64 encoding, and hashing. Thus, an attacker can easily apply brute force on them.

Exploit
  • EPSS 0.87%
  • Veröffentlicht 27.04.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 04:58:41

In Rukovoditel V2.5.2, attackers can upload an arbitrary file to the server just changing the the content-type value. As a result of that, an attacker can execute a command on the server. This specific attack only occurs with the Maintenance Mode set...

Exploit
  • EPSS 0.64%
  • Veröffentlicht 16.04.2020 19:15:27
  • Zuletzt bearbeitet 21.11.2024 04:58:42

Rukovoditel 2.5.2 is affected by a SQL injection vulnerability because of improper handling of the entities_id parameter.

Exploit
  • EPSS 27%
  • Veröffentlicht 16.04.2020 19:15:27
  • Zuletzt bearbeitet 21.11.2024 04:58:41

In Rukovoditel 2.5.2, an attacker may inject an arbitrary .php file location instead of a language file and thus achieve command execution.

Exploit
  • EPSS 0.05%
  • Veröffentlicht 16.04.2020 19:15:27
  • Zuletzt bearbeitet 21.11.2024 04:58:41

In Rukovoditel 2.5.2 has a form_session_token value to prevent CSRF attacks. This protection mechanism can be bypassed with another user's valid token. Thus, an attacker can change the Admin password by using a CSRF attack and escalate his/her privil...

Exploit
  • EPSS 0.64%
  • Veröffentlicht 16.04.2020 19:15:27
  • Zuletzt bearbeitet 21.11.2024 04:58:41

Rukovoditel 2.5.2 is affected by a SQL injection vulnerability because of improper handling of the reports_id (POST) parameter.

Exploit
  • EPSS 0.88%
  • Veröffentlicht 16.04.2020 19:15:27
  • Zuletzt bearbeitet 21.11.2024 04:58:41

In Rukovoditel 2.5.2, attackers can upload arbitrary file to the server by just changing the content-type value. As a result of that, an attacker can execute a command on the server. This specific attack only occurs without the Maintenance Mode setti...

  • EPSS 0.28%
  • Veröffentlicht 16.04.2020 19:15:27
  • Zuletzt bearbeitet 21.11.2024 04:58:41

In Rukovoditel 2.5.2, there is a stored XSS vulnerability on the configuration page via the copyright text input. Thus, an attacker can inject a malicious script to steal all users' valuable data. This copyright text is on every page so this attack v...

  • EPSS 0.31%
  • Veröffentlicht 16.04.2020 19:15:27
  • Zuletzt bearbeitet 21.11.2024 04:58:40

Rukovoditel 2.5.2 is affected by a SQL injection vulnerability because of improper handling of the filters[0][value] or filters[1][value] parameter.

Exploit
  • EPSS 2.2%
  • Veröffentlicht 07.05.2019 19:29:01
  • Zuletzt bearbeitet 21.11.2024 04:48:17

Rukovoditel through 2.4.1 allows XSS via a URL that lacks a module=users%2flogin substring.