vendor:
Cascade Server
by:
Emory University UTS Security Advisory
7.5
CVSS
HIGH
Command Execution
78
CWE
Product Name: Cascade Server
Affected Version From: all versions
Affected Version To: all versions
Patch Exists: YES
Related CWE: CVE-2009-0753
CPE: a:hannon_hill:cascade_server
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=88612, https://www.infosecmatter.com/nessus-plugin-library/?id=88499, https://www.infosecmatter.com/nessus-plugin-library/?id=88532, https://www.infosecmatter.com/nessus-plugin-library/?id=89614, https://www.infosecmatter.com/nessus-plugin-library/?id=56459, https://www.infosecmatter.com/list-of-metasploit-windows-exploits-detailed-spreadsheet/
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2009
Command Execution in Hannon Hill Cascade Server
Hannon Hill's Cascade Server product is vulnerable to a command execution vulnerability. An attacker with access to an unprivileged account within Cascade Server could exploit this vulnerability to run arbitrary commands on the system with the privileges of the user who started Cascade Server.
Mitigation:
Hannon Hill has released a patch which prevents the use of XSLT extensions.