漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
An issue was discovered in the Tightrope Media Carousel digital signage product 7.0.4.104. Due to insecure default permissions on the C:\TRMS\Services directory, an attacker who has gained access to the system can elevate their privileges from a restricted account to full SYSTEM by replacing the Carousel.Service.exe file with a custom malicious executable. This service is independent of the associated IIS web site, which means that this service can be manipulated by an attacker without losing access to vulnerabilities in the web interface (which would potentially be used in conjunction with this attack, to control the service). Once the attacker has replaced Carousel.Service.exe, the server can be restarted using the command "shutdown -r -t 0" from a web shell, causing the system to reboot and launching the malicious Carousel.Service.exe as SYSTEM on startup. If this malicious Carousel.Service.exe is configured to launch a reverse shell back to the attacker, then upon reboot the attacker will have a fully privileged remote command-line environment to manipulate the system further.
漏洞信息
N/A
漏洞
N/A
漏洞
Tightrope Media System Carousel digital signage 安全漏洞
漏洞信息
Tightrope Media System Carousel digital signage是美国Tightrope Media System公司的一套数字标牌管理系统。 Tightrope Media Carousel digital signage 7.0.4.104版本中存在安全漏洞,该漏洞源于程序为C:TRMSServices目录分配了不安全的默认权限。攻击者可通过使用恶意的可执行文件替换Carousel.Service.exe文件利用该漏洞将权限提升至SYSTEM。
漏洞信息
N/A
漏洞
N/A