vendor:
Security AppScan Standard
by:
Naser Farhadi
9.3
CVSS
HIGH
Remote Code Execution
94
CWE
Product Name: Security AppScan Standard
Affected Version From: <= 9.0.2
Affected Version To: <= 9.0.2
Patch Exists: YES
Related CWE: CVE-2014-6332
CPE: a:ibm:security_appscan_standard
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 7
2015
IBM Security AppScan Standard OLE Automation Array Remote Code Execution
This exploit is based on MS14-064 CVE-2014-6332 and allows attackers to execute arbitrary code on the vulnerable system. It uses a Python script to start a sample HTTP server on the attacker machine and serves an exploit code and Metasploit windows/shell_bind_tcp executable payload.
Mitigation:
Apply the latest security patches and ensure that all systems are up to date.