cve/2015/CVE-2015-4027.md

36 lines
1.5 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2015-4027](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4027)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The AcuWVSSchedulerv10 service in Acunetix Web Vulnerability Scanner (WVS) before 10 build 20151125 allows local users to gain privileges via a command parameter in the reporttemplate property in a params JSON object to api/addScan.
### POC
#### Reference
- http://packetstormsecurity.com/files/134602/Acunetix-WVS-10-Local-Privilege-Escalation.html
- https://www.exploit-db.com/exploits/38847/
#### Github
- https://github.com/1o24er/RedTeam
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/Red-Team
- https://github.com/Apri1y/Red-Team-links
- https://github.com/Echocipher/Resource-list
- https://github.com/Ondrik8/RED-Team
- https://github.com/dk47os3r/hongduiziliao
- https://github.com/hasee2018/Safety-net-information
- https://github.com/hudunkey/Red-Team-links
- https://github.com/john-80/-007
- https://github.com/landscape2024/RedTeam
- https://github.com/lp008/Hack-readme
- https://github.com/nobiusmallyu/kehai
- https://github.com/slimdaddy/RedTeam
- https://github.com/svbjdbk123/-
- https://github.com/twensoo/PersistentThreat
- https://github.com/xiaoZ-hc/redtool
- https://github.com/yut0u/RedTeam-BlackBox