Data di Pubblicazione:
2022
Abstract:
The article provides technical details and describes the steps needed for exploiting a software vulnerability in daloRADIUS (https://github.com/lirantal/daloradius). In particular, an unauthenticated user can gather information on the remote system just by visiting the following endpoints: /library/exten-radius_server_info.php (which reveals pieces of information such as system uptime, CPU load, etc.) and /library/exten-server_info.php (which reveals if mysql and/or freeradius are currently running).
The CVE-2022-4366 identifier has been assigned to the vulnerability (https://nvd.nist.gov/vuln/detail/CVE-2022-4366) which has a high severity score (7.5/10, assigned by NIST).
Tipologia CRIS:
05.12 Altro
Keywords:
cybersecurity; vulnerability; exploit; exploitation; disclosure; cve
Elenco autori:
Lauria, FILIPPO MARIA
Link alla scheda completa: