SB2023022032 - Multiple vulnerabilities in ServiceDesk Plus MSP
Published: February 20, 2023 Updated: March 9, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Permissions, Privileges, and Access Controls (CVE-ID: N/A)
The vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions when associating projects from requests. A remote user can escalate privileges within the application.
2) Permissions, Privileges, and Access Controls (CVE-ID: N/A)
The vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions when associating requests from from. A remote user can escalate privileges within the application.3) Permissions, Privileges, and Access Controls (CVE-ID: N/A)
The vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions when disassociating projects from requests. A remote user can escalate privileges within the application.
4) Improper Authentication (CVE-ID: N/A)
The vulnerability allows a remote attacker to bypass 2FA authentication process.
The vulnerability exists due to an error in the Two-Factor Authentication login page. A remote attacker with knowledge of victim's credentials can bypass 2FA authentication process and gain unauthorized access to the application.
5) Cleartext transmission of sensitive information (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to software uses insecure communication channel in backup scheduling to transmit passwords. A remote attacker with ability to intercept network traffic can gain access to sensitive data.
6) Resource exhaustion (CVE-ID: CVE-2023-26601)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources in the images upload feature (ImageUploadServlet). A remote user can upload unlimited number of images, consume all available disk space and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.