module
IBM Data Risk Manager Unauthenticated Remote Code Execution
| Disclosed |
|---|
| Apr 21, 2020 |
Disclosed
Apr 21, 2020
Description
IBM Data Risk Manager (IDRM) contains three vulnerabilities that can be chained by
an unauthenticated attacker to achieve remote code execution as root.
The first is an unauthenticated bypass, followed by a command injection as the server user,
and finally abuse of an insecure default password.
This module exploits all three vulnerabilities, giving the attacker a root shell.
At the time of disclosure this was an 0day, but it was later confirmed and patched by IBM.
The authentication bypass works on versions versions
an unauthenticated attacker to achieve remote code execution as root.
The first is an unauthenticated bypass, followed by a command injection as the server user,
and finally abuse of an insecure default password.
This module exploits all three vulnerabilities, giving the attacker a root shell.
At the time of disclosure this was an 0day, but it was later confirmed and patched by IBM.
The authentication bypass works on versions versions
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.