First published: Thu May 31 2018(Updated: )
The 'systemui/settings_network.php' and 'systemui/settings_patching.php' scripts in the Quest KACE System Management Appliance 8.0.318 are accessible only from localhost. This restriction can be bypassed by modifying the 'Host' and 'X_Forwarded_For' HTTP headers in a POST request. An anonymous user can abuse this vulnerability to execute critical functions without authorization.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Quest KACE Systems Management Appliance | =8.0.318 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11142 is considered a high severity vulnerability due to its potential for unauthorized access through header modification.
An attacker can exploit CVE-2018-11142 by altering the 'Host' and 'X_Forwarded_For' HTTP headers in a POST request to access restricted scripts.
CVE-2018-11142 affects Quest KACE System Management Appliance version 8.0.318.
To mitigate CVE-2018-11142, ensure access controls are enforced and avoid reliance on headers that can be manipulated.
Yes, updating to a later version of the Quest KACE System Management Appliance will typically address CVE-2018-11142.