Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown

CVE-2020-25564

Disclosure Date: August 11, 2021 (last updated February 23, 2025)
In SapphireIMS 5.0, it is possible to create local administrator on any client with credentials of a non-privileged user by directly accessing RemoteMgmtTaskSave (Automation Tasks) feature.
Attacker Value
Unknown

CVE-2020-25562

Disclosure Date: August 11, 2021 (last updated February 23, 2025)
In SapphireIMS 5.0, there is no CSRF token present in the entire application. This can lead to CSRF vulnerabilities in critical application forms like account resent.
Attacker Value
Unknown

CVE-2020-25566

Disclosure Date: August 11, 2021 (last updated February 23, 2025)
In SapphireIMS 5.0, it is possible to take over an account by sending a request to the Save_Password form as shown in POC. Notice that we do not require a JSESSIONID in this request and can reset any user’s password by changing the username to that user and password to base64(desired password).
Attacker Value
Unknown

CVE-2020-25560

Disclosure Date: August 11, 2021 (last updated February 23, 2025)
In SapphireIMS 5.0, it is possible to use the hardcoded credential in clients (username: sapphire, password: ims) and gain access to the portal. Once the access is available, the attacker can inject malicious OS commands on “ping”, “traceroute” and “snmp” functions and execute code on the server. We also observed the same is true if the JSESSIONID is completely removed.
Attacker Value
Unknown

CVE-2020-25561

Disclosure Date: August 11, 2021 (last updated February 23, 2025)
SapphireIMS 5 utilized default sapphire:ims credentials to connect the client to server. This credential is saved in ServerConf.config file in the client.
Attacker Value
Unknown

CVE-2020-25565

Disclosure Date: August 11, 2021 (last updated February 23, 2025)
In SapphireIMS 5.0, it is possible to use the hardcoded credential in clients (username: sapphire, password: ims) and gain access to the portal. Once the access is available, the attacker can inject malicious OS commands on “ping”, “traceroute” and “snmp” functions and execute code on the server.
Attacker Value
Unknown

CVE-2020-25563

Disclosure Date: August 11, 2021 (last updated February 23, 2025)
In SapphireIMS 5.0, it is possible to create local administrator on any client without requiring any credentials by directly accessing RemoteMgmtTaskSave (Automation Tasks) feature and not having a JSESSIONID.