漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
N/A
Vulnerability Description
In Sage 300 ERP (formerly accpac) through 6.8.x, the installer configures the C:\Sage\Sage300\Runtime directory to be the first entry in the system-wide PATH environment variable. However, this directory is writable by unprivileged users because the Sage installer fails to set explicit permissions and therefore inherits weak permissions from the C:\ folder. Because entries in the system-wide PATH variable are included in the search order for DLLs, an attacker could perform DLL search-order hijacking to escalate their privileges to SYSTEM. Furthermore, if the Global Search or Web Screens functionality is enabled, then privilege escalation is possible via the GlobalSearchService and Sage.CNA.WindowsService services, again via DLL search-order hijacking because unprivileged users would have modify permissions on the application directory. Note that while older versions of the software default to installing in %PROGRAMFILES(X86)% (which would allow the Sage folder to inherit strong permissions, making the installation not vulnerable), the official Sage 300 installation guides for those versions recommend installing in C:\Sage, which would make the installation vulnerable.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Sage 300 代码问题漏洞
Vulnerability Description
Sage 300是Sage公司的一个完善的闭源企业资源规划 (ERP) 解决方案,旨在促进企业管理。 Sage 300 ERP 6.8.x版本及之前版本存在安全漏洞,该漏洞源于无法设置显式权限,导致 C: 文件夹继承了弱权限。攻击者利用该漏洞执行 DLL 搜索,将其权限提升到 SYSTEM。
CVSS Information
N/A
Vulnerability Type
N/A