Vulnerabilities
Vulnerable Software
Opmantek:  Security Vulnerabilities
An information exposure issue has been discovered in Opmantek Open-AudIT 4.2.0. The vulnerability allows an authenticated attacker to read file outside of the restricted directory.
CVSS Score
6.5
EPSS Score
0.004
Published
2022-01-03
An issue was discovered in Opmantek Open-AudIT after 3.5.0. Without authentication, a vulnerability in code_igniter/application/controllers/util.php allows an attacker perform command execution without echoes.
CVSS Score
9.8
EPSS Score
0.01
Published
2021-12-22
Opmantek Open-AudIT Community 4.2.0 (Fixed in 4.3.0) is affected by a Cross Site Scripting (XSS) vulnerability. If a bad value is passed to the routine via a URL, malicious JavaScript code can be executed in the victim's browser.
CVSS Score
6.1
EPSS Score
0.045
Published
2021-12-20
Opmantek Open-AudIT 4.0.1 is affected by cross-site scripting (XSS). When outputting SQL statements for debugging, a maliciously crafted query can trigger an XSS attack. This attack only succeeds if the user is already logged in to Open-AudIT before they click the malicious link.
CVSS Score
6.1
EPSS Score
0.003
Published
2021-02-05
Within the Open-AudIT up to version 3.5.3 application, the web interface hides SSH secrets, Windows passwords, and SNMP strings from users using HTML 'password field' obfuscation. By using Developer tools or similar, it is possible to change the obfuscation so that the credentials are visible.
CVSS Score
5.9
EPSS Score
0.006
Published
2021-01-20
An issue was discovered in Open-AudIT 3.2.2. There are Multiple SQL Injections.
CVSS Score
9.8
EPSS Score
0.004
Published
2020-04-29
An issue was discovered in Open-AudIT 3.2.2. There is Arbitrary file upload.
CVSS Score
8.8
EPSS Score
0.038
Published
2020-04-29
Open-AudIT 3.3.0 allows an XSS attack after login.
CVSS Score
5.4
EPSS Score
0.003
Published
2020-04-28
An issue was discovered in Open-AudIT 3.3.1. There is shell metacharacter injection via attributes to an open-audit/configuration/ URI. An attacker can exploit this by adding an excluded IP address to the global discovery settings (internally called exclude_ip). This exclude_ip value is passed to the exec function in the discoveries_helper.php file (inside the all_ip_list function) without being filtered, which means that the attacker can provide a payload instead of a valid IP address.
CVSS Score
8.8
EPSS Score
0.637
Published
2020-04-28
An issue was discovered in Open-AudIT 3.2.2. There is OS Command injection in Discovery.
CVSS Score
8.8
EPSS Score
0.04
Published
2020-04-27


Contact Us

Shodan ® - All rights reserved