Show filters
73 Total Results
Displaying 51-60 of 73
Sort by:
Attacker Value
Unknown
Rapid7 Nexpose Insufficient Session Management
Disclosure Date: August 21, 2019 (last updated September 17, 2024)
Rapid7 Nexpose versions 6.5.50 and prior suffer from insufficient session expiration when an administrator performs a security relevant edit on an existing, logged on user. For example, if a user's password is changed by an administrator due to an otherwise unrelated credential leak, that user account's current session is still valid after the password change, potentially allowing the attacker who originally compromised the credential to remain logged in and able to cause further damage.
0
Attacker Value
Unknown
Rapid7 InsightAppSec Local Privilege Escalation
Disclosure Date: August 19, 2019 (last updated November 27, 2024)
The Rapid7 InsightAppSec broker suffers from a DLL injection vulnerability in the 'prunsrv.exe' component of the product. If exploited, a local user of the system (who must already be authenticated to the operating system) can elevate their privileges with this vulnerability to the privilege level of InsightAppSec (usually, SYSTEM). This issue affects version 2019.06.24 and prior versions of the product.
0
Attacker Value
Unknown
CVE-2019-5629
Disclosure Date: July 13, 2019 (last updated November 27, 2024)
Rapid7 Insight Agent, version 2.6.3 and prior, suffers from a local privilege escalation due to an uncontrolled DLL search path. Specifically, when Insight Agent 2.6.3 and prior starts, the Python interpreter attempts to load python3.dll at "C:\DLLs\python3.dll," which normally is writable by locally authenticated users. Because of this, a malicious local user could use Insight Agent's startup conditions to elevate to SYSTEM privileges. This issue was fixed in Rapid7 Insight Agent 2.6.4.
0
Attacker Value
Unknown
Rapid7 Nexpose/InsightVM Security Console CSRF
Disclosure Date: July 03, 2019 (last updated November 27, 2024)
A Cross-Site Request Forgery (CSRF) vulnerability was found in Rapid7 Nexpose InsightVM Security Console versions 6.5.0 through 6.5.68. This issue allows attackers to exploit CSRF vulnerabilities on API endpoints using Flash to circumvent a cross-domain pre-flight OPTIONS request.
0
Attacker Value
Unknown
Rapid7 InsightVM Stored Credential Exposure
Disclosure Date: April 09, 2019 (last updated November 27, 2024)
Users with Site-level permissions can access files containing the username-encrypted passwords of Security Console Global Administrators and clear-text passwords for restoring backups, as well as the salt for those passwords. Valid credentials are required to access these files and malicious users would still need to perform additional work to decrypt the credentials and escalate privileges. This issue affects: Rapid7 InsightVM versions 6.5.11 through 6.5.49.
0
Attacker Value
Unknown
CVE-2018-5559
Disclosure Date: November 28, 2018 (last updated November 27, 2024)
In Rapid7 Komand version 0.41.0 and prior, certain endpoints that are able to list the always encrypted-at-rest connection data could return some configurations of connection data without obscuring sensitive data from the API response sent over an encrypted channel. This issue does not affect Rapid7 Komand version 0.42.0 and later versions.
0
Attacker Value
Unknown
CVE-2017-5264
Disclosure Date: December 14, 2017 (last updated November 26, 2024)
Versions of Nexpose prior to 6.4.66 fail to adequately validate the source of HTTP requests intended for the Automated Actions administrative web application, and are susceptible to a cross-site request forgery (CSRF) attack.
0
Attacker Value
Unknown
CVE-2017-15084
Disclosure Date: October 06, 2017 (last updated November 26, 2024)
The web UI in Rapid7 Metasploit before 4.14.1-20170828 allows logout CSRF, aka R7-2017-22.
0
Attacker Value
Unknown
CVE-2017-5242
Disclosure Date: August 19, 2017 (last updated October 08, 2023)
Nexpose and InsightVM virtual appliances downloaded between April 5th, 2017 and May 3rd, 2017 contain identical SSH host keys. Normally, a unique SSH host key should be generated the first time a virtual appliance boots.
0
Attacker Value
Unknown
CVE-2017-5244
Disclosure Date: June 15, 2017 (last updated November 26, 2024)
Routes used to stop running Metasploit tasks (either particular ones or all tasks) allowed GET requests. Only POST requests should have been allowed, as the stop/stop_all routes change the state of the service. This could have allowed an attacker to stop currently-running Metasploit tasks by getting an authenticated user to execute JavaScript. As of Metasploit 4.14.0 (Update 2017061301), the routes for stopping tasks only allow POST requests, which validate the presence of a secret token to prevent CSRF attacks.
0