Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Security)  >   CyberArk Vendors:   CyberArk Software
CyberArk Password Vault Web Access Input Validation Flaw in HTTP Authentication Header Lets Remote Users Execute Arbitrary Code on the Target System
SecurityTracker Alert ID:  1040675
SecurityTracker URL:
CVE Reference:   CVE-2018-9843   (Links to External Site)
Date:  Apr 12 2018
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  

Description:   A vulnerability was reported in CyberArk Password Vault Web Access. A remote user can execute arbitrary code on the target system.

A remote user can send specially crafted serialized 'CyberArk.Services.Web.SessionIdentifiers' .NET objects in an HTTP Authentication header to the target Web Access REST API to execute arbitrary code on the target system. The code will run with the privileges of the target service.

The vendor was notified on February 5, 2018.

The original advisory and demonstration exploit is available at:

RedTeam Pentesting GmbH reported this vulnerability.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   The vendor has issued a fix (9.9.5, 9.10, 10.2).

No public vendor advisory was available at the time of this entry.

Vendor URL: (Links to External Site)
Cause:   Access control error, Input validation error
Underlying OS:  Windows (2012)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC