Wazuh API in Wazuh from 4.0.0 to 4.0.3 allows authenticated users to execute arbitrary code with administrative privileges via /manager/files URI
Reporter | Title | Published | Views | Family All 11 |
---|---|---|---|---|
![]() | Improper Input Validation (RCE) | 18 Mar 202119:30 | – | osv |
![]() | CVE-2021-26814 | 6 Mar 202102:15 | – | osv |
![]() | Exploit for Path Traversal in Wazuh | 18 May 202113:45 | – | githubexploit |
![]() | Exploit for Path Traversal in Wazuh | 17 May 202110:13 | – | githubexploit |
![]() | Exploit for Path Traversal in Wazuh | 10 Jul 202116:04 | – | githubexploit |
![]() | Exploit for Path Traversal in Wazuh | 10 Jul 202116:04 | – | githubexploit |
![]() | Wazuh API Arbitrary Code Execution Vulnerability | 9 Mar 202100:00 | – | cnvd |
![]() | CVE-2021-26814 | 6 Mar 202101:24 | – | cvelist |
![]() | CVE-2021-26814 | 6 Mar 202102:15 | – | nvd |
![]() | Input validation | 6 Mar 202102:15 | – | prion |
Source | Link |
---|---|
documentation | www.documentation.wazuh.com/4.0/release-notes/release_4_0_4.html |
github | www.github.com/wazuh/wazuh/releases/tag/v4.0.4 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo