LogRhythm Platform Manager 7.4.9

CPE Details

LogRhythm Platform Manager 7.4.9
7.4.9
2020-12-17
18h03 +00:00
2020-12-17
18h03 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:logrhythm:platform_manager:7.4.9:*:*:*:*:*:*:*

Informations

Vendor

logrhythm

Product

platform_manager

Version

7.4.9

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2020-25094 2020-12-17 01h04 +00:00 LogRhythm Platform Manager 7.4.9 allows Command Injection. To exploit this, an attacker can inject arbitrary program names and arguments into a WebSocket. These are forwarded to any remote server with a LogRhythm Smart Response agent installed. By default, the commands are run with LocalSystem privileges.
9.8
Critique
CVE-2020-25095 2020-12-17 01h04 +00:00 LogRhythm Platform Manager (PM) 7.4.9 allows CSRF. The Web interface is vulnerable to Cross-site WebSocket Hijacking (CSWH). If a logged-in PM user visits a malicious site in the same browser session, that site can perform a CSRF attack to create a WebSocket from the victim client to the vulnerable PM server. Once the socket is created, the malicious site can interact with the vulnerable web server in the context of the logged-in user. This can include WebSocket payloads that result in command execution.
8.8
Haute
CVE-2020-25096 2020-12-17 01h03 +00:00 LogRhythm Platform Manager (PM) 7.4.9 has Incorrect Access Control. Users within LogRhythm can be delegated different roles and privileges, intended to limit what data and services they can interact with. However, no access control is enforced for WebSocket-based communication to the PM application server, which will forward requests to any configured back-end server, regardless of whether the user's access rights should permit this. As a result, even the most low-privileged user can interact with any back-end component that has a LogRhythm agent installed.
8.8
Haute