The Netskope client service, v57 before 57.2.0.219 and v60 before 60.2.0.214, running with NT\SYSTEM privilege, accepts network connections from localhost. The connection handling function in this service suffers from command injection vulnerability. Local users can use this vulnerability to execute code with NT\SYSTEM privilege.
Solution:
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://support.netskope.com/hc/article_attachments/360033003553/Sprint_62_Release_Notes.pdf | release notes permissions required vendor advisory |
https://support.netskope.com/hc/en-us/articles/360014589894-Netskope-Client | permissions required vendor advisory |
https://airbus-seclab.github.io/advisories/netskope.html | third party advisory |