Subscribe via feed.

Servisnet Tessa Privilege Escalation

Posted by deepcore on February 5, 2022 – 1:51 pm

This Metasploit module exploits privilege escalation in Servisnet Tessa triggered by the add new sysadmin user flow with any user authorization. An API request to “/data-service/users/[userid]” with any low-authority user returns other users’ information in response. The encrypted password information is included here, but privilege escalation is also possible with the active sessionid value.


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.