The REST API in CyberArk Password Vault Web Access before 9.9.5 and 10.x before 10.1 allows remote attackers to execute arbitrary code via a serialized .NET object in an Authorization HTTP header.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
http://seclists.org/fulldisclosure/2018/Apr/18 | mailing list exploit third party advisory |
http://www.securitytracker.com/id/1040675 | vdb entry third party advisory |
https://www.exploit-db.com/exploits/44429/ | exploit vdb entry third party advisory |
https://www.redteam-pentesting.de/en/advisories/rt-sa-2017-014/-cyberark-password-vault-web-access-remote-code-execution | third party advisory exploit |
http://www.securityfocus.com/archive/1/541932/100/0/threaded | mailing list exploit vdb entry third party advisory |