A buffer overflow in the web server of Flexense DupScout Enterprise 10.0.18 allows a remote anonymous attacker to execute code as SYSTEM by overflowing the sid parameter via a GET /settings&sid= attack.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/49217 | exploit vdb entry third party advisory |
https://www.dupscout.com | product |
https://fluidattacks.com/advisories/prine/ | third party advisory exploit |