Skip to Main Content (Press Enter)

Logo CNR
  • ×
  • Home
  • People
  • Outputs
  • Organizations
  • Expertise & Skills

UNI-FIND
Logo CNR

|

UNI-FIND

cnr.it
  • ×
  • Home
  • People
  • Outputs
  • Organizations
  • Expertise & Skills
  1. Outputs

Sensitive system information disclosure in daloRADIUS

Other Research Product
Publication Date:
2022
abstract:
The article provides technical details and describes the steps needed for exploiting a software vulnerability in daloRADIUS (https://github.com/lirantal/daloradius). In particular, an unauthenticated user can gather information on the remote system just by visiting the following endpoints: /library/exten-radius_server_info.php (which reveals pieces of information such as system uptime, CPU load, etc.) and /library/exten-server_info.php (which reveals if mysql and/or freeradius are currently running). The CVE-2022-4366 identifier has been assigned to the vulnerability (https://nvd.nist.gov/vuln/detail/CVE-2022-4366) which has a high severity score (7.5/10, assigned by NIST).
Iris type:
05.12 Altro
Keywords:
cybersecurity; vulnerability; exploit; exploitation; disclosure; cve
List of contributors:
Lauria, FILIPPO MARIA
Authors of the University:
LAURIA FILIPPO MARIA
Handle:
https://iris.cnr.it/handle/20.500.14243/414170
  • Overview

Overview

URL

https://huntr.dev/bounties/f225d69a-d971-410d-a8f9-b0026143aed8/
  • Use of cookies

Powered by VIVO | Designed by Cineca | 26.5.0.0 | Sorgente dati: PREPROD (Ribaltamento disabilitato)