0x1911

3 exploits Active since Dec 2019
CVE-2019-20049 EXPLOITDB CRITICAL python WORKING POC
Al-enterprise Omnivista 4760 - Remote Code Execution
An issue was discovered on Alcatel-Lucent OmniVista 4760 devices. A remote unauthenticated attacker can chain a directory traversal (which helps to bypass authentication) with an insecure file upload to achieve Remote Code Execution as SYSTEM. The directory traversal is in the __construct() whereas the insecure file upload is in SetSkinImages().
CVSS 9.8
CVE-2019-20048 EXPLOITDB HIGH python WORKING POC
Al-enterprise Omnivista 8770 < 4.1.12 - Unrestricted File Upload
An issue was discovered on Alcatel-Lucent OmniVista 8770 devices before 4.1.2. An authenticated remote attacker, with elevated privileges in the Web Directory component on port 389, may upload a PHP file to achieve Remote Code Execution as SYSTEM.
CVSS 7.2
CVE-2019-20047 EXPLOITDB HIGH python WORKING POC
Al-enterprise Omnivista 4760 - Insufficiently Protected Credentials
An issue was discovered on Alcatel-Lucent OmniVista 4760 devices, and 8770 devices before 4.1.2. An incorrect web server configuration allows a remote unauthenticated attacker to retrieve the content of its own session files. Every session file contains the administrative LDAP credentials encoded in a reversible format. Sessions are stored in /sessions/sess_<sessionid>.
CVSS 7.5