SysAid On-Premise 20.1.11, by default, allows the AJP protocol port, which is vulnerable to a GhostCat attack. Additionally, it allows unauthenticated access to upload files, which can be used to execute commands on the system by chaining it with a GhostCat attack. NOTE: This may be a duplicate of CVE-2020-1938
History

Mon, 18 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2020-04-21T19:01:37

Updated: 2024-11-18T17:46:46.843Z

Reserved: 2020-03-14T00:00:00

Link: CVE-2020-10569

cve-icon Vulnrichment

Updated: 2024-08-04T11:06:09.450Z

cve-icon NVD

Status : Modified

Published: 2020-04-21T19:15:12.880

Modified: 2024-11-21T04:55:36.143

Link: CVE-2020-10569

cve-icon Redhat

No data.