First published: Thu Feb 08 2018(Updated: )
This vulnerability allows remote attackers to bypass authentication on vulnerable installations of Quest NetVault Backup 11.2.0.13. The specific flaw exists within JSON RPC Request handling. By setting the checksession parameter to a specific value, it is possible to bypass authentication to critical functions. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-4752.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Quest NetVault Backup | =11.2.0.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1163 is considered to be a high severity vulnerability due to its potential for unauthorized access.
To fix CVE-2018-1163, update Quest NetVault Backup to the latest version that addresses this vulnerability.
CVE-2018-1163 allows remote attackers to bypass authentication, which can lead to unauthorized access.
CVE-2018-1163 specifically affects Quest NetVault Backup version 11.2.0.13.
CVE-2018-1163 allows attackers to bypass authentication by manipulating the JSON RPC Request handling with the checksession parameter.