Description
Secure/SAService.rem in Deltek Ajera Timesheets 9.10.16 and prior are vulnerable to remote code execution via deserialization of untrusted user input from an authenticated user. The executed code will run as the IIS Application Pool that is running the application.
Exploits (1)
exploitdb
WORKING POC
by Anthony Cole · textwebappswindows
https://www.exploit-db.com/exploits/46086
References (2)
Core 2
Core References
Exploit, Third Party Advisory, VDB Entry x_refsource_misc
http://packetstormsecurity.com/files/151035/Ajera-Timesheets-9.10.16-Deserialization.html
Exploit, Third Party Advisory, VDB Entry x_refsource_misc
https://www.exploit-db.com/exploits/46086/
Scores
CVSS v3
8.8
EPSS
0.0456
EPSS Percentile
89.2%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-502
Status
published
Products (1)
deltek/ajera
< 9.10.16
Published
Mar 21, 2019
Tracked Since
Feb 18, 2026