### [CVE-2018-11142](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11142) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The 'systemui/settings_network.php' and 'systemui/settings_patching.php' scripts in the Quest KACE System Management Appliance 8.0.318 are accessible only from localhost. This restriction can be bypassed by modifying the 'Host' and 'X_Forwarded_For' HTTP headers in a POST request. An anonymous user can abuse this vulnerability to execute critical functions without authorization. ### POC #### Reference - https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities - https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities #### Github No PoCs found on GitHub currently.