First published: Thu May 31 2018(Updated: )
The 'checksum' parameter of the '/common/download_attachment.php' script in the Quest KACE System Management Appliance 8.0.318 can be abused to read arbitrary files with 'www' privileges via Directory Traversal. No administrator privileges are needed to execute this script.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Quest KACE Systems Management Appliance | =8.0.318 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11137 is considered critical due to its potential for unauthorized file access through Directory Traversal.
To fix CVE-2018-11137, update the Quest KACE System Management Appliance to the latest version that includes security patches.
Exploitation of CVE-2018-11137 could lead to unauthorized information disclosure by allowing attackers to read sensitive files.
CVE-2018-11137 specifically affects Quest KACE System Management Appliance version 8.0.318.
No, exploiting CVE-2018-11137 does not require administrator privileges, making it particularly concerning for security.