Arbitrary Code Execution Vulnerability via File Impersonation in Kaizen Asset Manager and Training Manager (Enterprise Edition)

Arbitrary Code Execution Vulnerability via File Impersonation in Kaizen Asset Manager and Training Manager (Enterprise Edition)

CVE-2018-16545 · MEDIUM Severity

AV:N/AC:M/AU:N/C:P/I:P/A:P

Kaizen Asset Manager (Enterprise Edition) and Training Manager (Enterprise Edition) allow a remote attacker to achieve arbitrary code execution via file impersonation. For example, a malicious dynamic-link library (dll) assumed the identity of a temporary (tmp) file (isxdl.dll) and an executable file assumed the identity of a temporary file (996E.temp).

Learn more about our Web Application Penetration Testing UK.