Learn about CVE-2019-11552 affecting Code42 Enterprise and Crashplan versions before 6.7.5, 6.8.8, and 6.9.4. Understand the eval injection vulnerability and how to mitigate the risk.
Code42 Enterprise and Crashplan for Small Business Client versions before 6.7.5, 6.8.8, and 6.9.4 are vulnerable to eval injection, allowing unauthorized code execution at a higher privilege level.
Understanding CVE-2019-11552
This CVE involves a security vulnerability in Code42 Enterprise and Crashplan for Small Business Client versions.
What is CVE-2019-11552?
The vulnerability in versions before 6.7.5, 6.8.8, and 6.9.4 allows a less privileged user to create a proxy auto-configuration file that can execute unauthorized code at a higher privilege level, posing a significant security risk.
The Impact of CVE-2019-11552
The vulnerability could lead to unauthorized code execution at a higher privilege level, potentially compromising the security of the affected systems.
Technical Details of CVE-2019-11552
This section provides more technical insights into the CVE.
Vulnerability Description
The vulnerability allows eval injection, enabling a lesser privileged user to run unauthorized code at a higher privilege level through a crafted proxy auto-configuration file.
Affected Systems and Versions
Exploitation Mechanism
The exploitation involves creating a proxy auto-configuration file that executes unauthorized code at a higher privilege level, potentially leading to a security breach.
Mitigation and Prevention
Protecting systems from CVE-2019-11552 is crucial to maintaining security.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates