Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-5354

EPSS 3.92% · P88
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2018-5354

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The custom GINA/CP module in ANIXIS Password Reset Client before version 3.22 allows remote attackers to execute code and escalate privileges via spoofing. When the client is configured to use HTTP, it does not authenticate the intended server before opening a browser window. An unauthenticated attacker capable of conducting a spoofing attack can redirect the browser to gain execution in the context of the WinLogon.exe process. If Network Level Authentication is not enforced, the vulnerability can be exploited via RDP.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
ANIXIS Password Reset Client 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
anixis password reset client是 ANIXIS 3.22之前版本存在安全漏洞,该漏洞源于密码重置客户端定制GINA/CP模块允许远程攻击者通过欺骗来执行代码和升级特权。当客户端配置为使用HTTP时,它在打开浏览器窗口之前不会对预期的服务器进行身份验证。能够执行欺骗攻击的未经身份验证的攻击者可以重定向浏览器以在winlogin .exe进程上下文中执行。如果没有实施网络级身份验证,则可以通过RDP利用该漏洞。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2018-5354

#POC DescriptionSource LinkShenlong Link
1CVE-2018-5354https://github.com/missing0x00/CVE-2018-5354POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2018-5354

Please Login to view more intelligence information

Same Patch Batch · n/a · 2020-09-29 · 23 CVEs total

CVE-2020-155954.3 MEDIUMZoho Application Control Plus 安全漏洞
CVE-2020-155944.3 MEDIUMZoho Application Control Plus 信息泄露漏洞
CVE-2020-26154libproxy 缓冲区错误漏洞
CVE-2020-26137urllib3 注入漏洞
CVE-2020-26150Logaritmo Aware CallManager 信息泄露漏洞
CVE-2020-13794Linux kernel 信息泄露漏洞
CVE-2018-5353ZOHO ManageEngine ADSelfService Plus 安全漏洞
CVE-2020-24570MB CONNECT LINE mymbCONNECT24和mbCONNECT24 SQL跨站请求伪造漏洞
CVE-2020-24569MB CONNECT LINE mymbCONNECT24和knximport SQL注入漏洞
CVE-2020-25763Seat Reservation System 代码问题漏洞
CVE-2020-25762Seat Reservation System SQL注入漏洞
CVE-2020-25761Projectworlds Visitor Management System 跨站脚本漏洞
CVE-2020-25760Projectworlds Visitor Management System SQL注入漏洞
CVE-2020-13658Lansweeper 跨站请求伪造漏洞
CVE-2020-26148md4c 安全漏洞
CVE-2020-20800MetInfo SQL注入漏洞
CVE-2020-26043Hoosk CmS 跨站脚本漏洞
CVE-2020-8243Pulse Secure Pulse Connect Secure 代码注入漏洞
CVE-2020-26042Hoosk CMS SQL注入漏洞
CVE-2020-8256Pulse Secure Connect Secure 代码问题漏洞

Showing top 20 of 23 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2018-5354

No comments yet


Leave a comment