In SapphireIMS 5.0, it is possible to use the hardcoded credential in clients (username: sapphire, password: ims) and gain access to the portal. Once the access is available, the attacker can inject malicious OS commands on “ping”, “traceroute” and “snmp” functions and execute code on the server.
The product contains hard-coded credentials, such as a password or cryptographic key.
Link | Tags |
---|---|
https://vuln.shellcoder.party/tags/sapphireims/ | third party advisory exploit |
https://vuln.shellcoder.party/2020/09/19/cve-2020-25565-sapphireims-unprivileged-user-remote-command-execution-on-server/ | third party advisory exploit |