Sera 1.2 stores the user's login password in plain text in their home directory. This makes privilege escalation trivial and also exposes the user and system keychains to local attacks.
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Link | Tags |
---|---|
https://m4.rkw.io/blog/cve201715918-sera-12-local-root-privesc-and-password-disclosure.html | third party advisory exploit |
https://www.exploit-db.com/exploits/43221/ | exploit vdb entry third party advisory |