SysAid On-Premise 20.1.11, by default, allows the AJP protocol port, which is vulnerable to a GhostCat attack. Additionally, it allows unauthenticated access to upload files, which can be used to execute commands on the system by chaining it with a GhostCat attack. NOTE: This may be a duplicate of CVE-2020-1938
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 18 Nov 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-18T17:46:46.843Z
Reserved: 2020-03-14T00:00:00.000Z
Link: CVE-2020-10569
Updated: 2024-08-04T11:06:09.450Z
Status : Modified
Published: 2020-04-21T19:15:12.880
Modified: 2024-11-21T04:55:36.143
Link: CVE-2020-10569
No data.
OpenCVE Enrichment
No data.
Weaknesses