Arcserve UDP through 9.0.6034 allows authentication bypass. The method getVersionInfo at WebServiceImpl/services/FlashServiceImpl leaks the AuthUUID token. This token can be used at /WebServiceImpl/services/VirtualStandbyServiceImpl to obtain a valid session. This session can be used to execute any task as administrator.
References
Link | Resource |
---|---|
https://support.arcserve.com/s/article/KB000015720?language=en_US | |
https://www.arcserve.com/products/arcserve-udp | Product |
https://www.mdsec.co.uk/2023/06/cve-2023-26258-remote-code-execution-in-arcserve-udp-backup/ | Exploit Technical Description Third Party Advisory |
https://support.arcserve.com/s/article/KB000015720?language=en_US | |
https://www.arcserve.com/products/arcserve-udp | Product |
https://www.mdsec.co.uk/2023/06/cve-2023-26258-remote-code-execution-in-arcserve-udp-backup/ | Exploit Technical Description Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-07-03 15:15
Updated : 2024-11-21 07:50
NVD link : CVE-2023-26258
Mitre link : CVE-2023-26258
CVE.ORG link : CVE-2023-26258
JSON object : View
Products Affected
arcserve
- udp
CWE
CWE-863
Incorrect Authorization