Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Kofax Capture 6.0.0.0 Unauthenticated File Read/Write & SMB Coercion via .NET Remoting
Vulnerability Description
Kofax Capture, now referred to as Tungsten Capture, version 6.0.0.0 (other versions may be affected) exposes a deprecated .NET Remoting HTTP channel on port 2424 via the Ascent Capture Service that is accessible without authentication and uses a default, publicly known endpoint identifier. An unauthenticated remote attacker can exploit .NET Remoting object unmarshalling techniques to instantiate a remote System.Net.WebClient object and read arbitrary files from the server filesystem, write attacker-controlled files to the server, or coerce NTLMv2 authentication to an attacker-controlled host, enabling sensitive credential disclosure, denial of service, remote code execution, or lateral movement depending on service account privileges and network environment.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
关键功能的认证机制缺失
Vulnerability Title
Kofax Capture 访问控制错误漏洞
Vulnerability Description
Kofax Capture是美国Kofax公司的一个应用程序。提供一流的预构建智能文档处理功能。 Kofax Capture 6.0.0.0版本存在访问控制错误漏洞,该漏洞源于暴露了无需身份验证且使用默认公开端点标识符的.NET Remoting HTTP通道,允许未经身份验证的远程攻击者利用.NET Remoting对象解组技术实例化远程System.Net.WebClient对象,从服务器文件系统读取任意文件、写入攻击者控制的文件或强制NTLMv2身份验证到攻击者控制的主机。
CVSS Information
N/A
Vulnerability Type
N/A