{"id":2058,"date":"2023-08-17T09:46:26","date_gmt":"2023-08-17T07:46:26","guid":{"rendered":"https:\/\/certitude.consulting\/blog\/?p=2058"},"modified":"2023-08-17T09:46:27","modified_gmt":"2023-08-17T07:46:27","slug":"privilege-escalation-in-ibm-spectrum-virtualize-de","status":"publish","type":"post","link":"https:\/\/certitude.consulting\/blog\/de\/privilege-escalation-in-ibm-spectrum-virtualize-de\/","title":{"rendered":"Privilege Escalation in IBM Spectrum Virtualize"},"content":{"rendered":"\n<p><strong>Im Rahmen einer oberfl\u00e4chlichen Sicherheitspr\u00fcfung stellte Cert<span style=\"text-decoration: underline;\">it<\/span>ude zwei Schwachstellen in der Firmware der IBM Spectrum Virtualize Storage-L\u00f6sung fest. Eine der Schwachstellen erlaubt es einem Benutzer der Administrationsschnittstelle, der nur \u00fcber eingeschr\u00e4nkte Berechtigungen verf\u00fcgt, beliebigen Code auszuf\u00fchren.<\/strong><\/p>\n\n\n\n<p>Details zu dieser Schwachstelle finden sich in der <a href=\"https:\/\/certitude.consulting\/blog\/en\/?p=2054\" data-type=\"URL\" data-id=\"https:\/\/certitude.consulting\/blog\/en\/?p=2054\">englischen Version<\/a> dieses Blogposts.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Im Rahmen einer oberfl\u00e4chlichen Sicherheitspr\u00fcfung stellte Certitude zwei Schwachstellen in der Firmware der IBM Spectrum Virtualize Storage-L\u00f6sung fest. Eine der Schwachstellen erlaubt es einem Benutzer der Administrationsschnittstelle, der nur \u00fcber eingeschr\u00e4nkte Berechtigungen verf\u00fcgt, beliebigen Code auszuf\u00fchren. Details zu dieser Schwachstelle finden sich in der englischen Version dieses Blogposts.<\/p>\n","protected":false},"author":4,"featured_media":2057,"comment_status":"closed","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[78,63],"tags":[290],"class_list":["post-2058","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-schwachstellen-research","category-technische-analyse","tag-ibm"],"_links":{"self":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/comments?post=2058"}],"version-history":[{"count":2,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2058\/revisions"}],"predecessor-version":[{"id":2080,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2058\/revisions\/2080"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media\/2057"}],"wp:attachment":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media?parent=2058"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/categories?post=2058"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/tags?post=2058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}