vendor:
LogonTracer
by:
g0ldm45k
9.8
CVSS
CRITICAL
Remote Code Execution
502
CWE
Product Name: LogonTracer
Affected Version From: 1.2.0 and earlier
Affected Version To: 1.2.0
Patch Exists: YES
Related CWE: CVE-2018-16167
CPE: a:jpcert:logontracer:1.2.0
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Debian GNU/Linux 8 (jessie)
2021
LogonTracer 1.2.0 – Remote Code Execution (Unauthenticated)
LogonTracer 1.2.0 is vulnerable to remote code execution due to an insecure deserialization vulnerability. An attacker can send a malicious payload to the vulnerable endpoint, which will be executed on the server. This exploit uses a python reverse shell payload to connect back to the attacker's machine.
Mitigation:
The vendor has released a patch to address this vulnerability. It is recommended to upgrade to the latest version of LogonTracer.