戴尔KACE K1000远程执行代码

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

This is the story of an unauthenticated RCE affecting one of Dropbox’s in scope vendors during [last year’s H1-3120](https://blogs.dropbox.com/tech/2018/09/live-hacking-dropbox-h1-3120/)event. It’s one of my more recon-intensive, yet simple, vulnerabilities, and it (probably) helped me to become MVH by the end of the day ;-). **TL;DR** It’s all about an undisclosed but fixed bug in the KACE Systems Management Appliance internally tracked by the ID *K1-18652* which allows an unauthenticated attacker to execute arbitrary code on the appliance. Since the main purpose of the appliance is to manage client endpoints - and you are able to deploy software packages to clients - I theoretically achieved RCE on all of the vendor’s clients. It turns out that Dell (the software is now maintained by Quest) have silently fixed this vulnerability with the release of version 6.4 SP3 (6.4.120822). ### Recon is Key! While doing recon for the in-scope assets during H1-3120, I came across an...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息