Ahsay

Cloud Backup Suite

7 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 9.32%
  • Published 21.09.2022 17:15:09
  • Last modified 28.05.2025 14:15:29

Ahsay AhsayCBS 9.1.4.0 allows an authenticated system user to inject arbitrary Java JVM options. Administrators that can modify the Runtime Options in the web interface can inject Java Runtime Options. These take effect after a restart. For example, ...

Exploit
  • EPSS 0.8%
  • Published 06.01.2020 21:15:11
  • Last modified 21.11.2024 05:34:41

An insecure file upload and code execution issue was discovered in Ahsay Cloud Backup Suite 8.3.0.30 via a "PUT /obs/obm7/file/upload" request with the base64-encoded pathname in the X-RSW-custom-encode-path HTTP header, and the content in the HTTP r...

Exploit
  • EPSS 0.24%
  • Published 26.07.2019 21:15:11
  • Last modified 21.11.2024 04:18:46

An issue was discovered in Ahsay Cloud Backup Suite before 8.1.1.50. When creating a trial account, it is possible to inject XSS in the Alias field, allowing the attacker to retrieve the admin's cookie and take over the account.

Exploit
  • EPSS 0.48%
  • Published 26.07.2019 21:15:11
  • Last modified 21.11.2024 04:18:46

An issue was discovered in Ahsay Cloud Backup Suite before 8.1.1.50. With a valid administrator account, the "Move / Import / Export Users" screen has an Import Users option. This option accepts a ZIP archive containing a users.xml file that can trig...

Exploit
  • EPSS 0.72%
  • Published 26.07.2019 21:15:11
  • Last modified 21.11.2024 04:18:46

An issue was discovered in Ahsay Cloud Backup Suite before 8.1.1.50. On the /cbs/system/ShowAdvanced.do "File Explorer" screen, it is possible to change the directory in the JavaScript code. If changed to (for example) "C:" then one can browse the wh...

  • EPSS 15.29%
  • Published 26.07.2019 21:15:11
  • Last modified 21.11.2024 04:18:46

An issue was discovered in Ahsay Cloud Backup Suite before 8.1.1.50. When sending an out-of-bounds XML document to a URL, it is possible to read the file structure and even the content of files without authentication.

Exploit
  • EPSS 66.17%
  • Published 26.07.2019 21:15:11
  • Last modified 21.11.2024 04:18:46

An insecure file upload and code execution issue was discovered in Ahsay Cloud Backup Suite 8.1.0.50. It is possible to upload a file into any directory of the server. One can insert a JSP shell into the web server's directory and execute it. This le...