Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-12483

Опубликовано: 04 авг. 2018
Источник: debian
EPSS Низкий

Описание

OCS Inventory 2.4.1 is prone to a remote command-execution vulnerability. Specifically, this issue occurs because the content of the ipdiscover_analyser rzo GET parameter is concatenated to a string used in an exec() call in the PHP code. Authentication is needed in order to exploit this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ocsinventory-serverfixed2.5+dfsg-1package

Примечания

  • Authentication is needed, only supported in trusted environments, see debtags

EPSS

Процентиль: 82%
0.01736
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 7 лет назад

OCS Inventory 2.4.1 is prone to a remote command-execution vulnerability. Specifically, this issue occurs because the content of the ipdiscover_analyser rzo GET parameter is concatenated to a string used in an exec() call in the PHP code. Authentication is needed in order to exploit this vulnerability.

CVSS3: 8.8
nvd
больше 7 лет назад

OCS Inventory 2.4.1 is prone to a remote command-execution vulnerability. Specifically, this issue occurs because the content of the ipdiscover_analyser rzo GET parameter is concatenated to a string used in an exec() call in the PHP code. Authentication is needed in order to exploit this vulnerability.

CVSS3: 8.8
github
больше 3 лет назад

OCS Inventory 2.4.1 is prone to a remote command-execution vulnerability. Specifically, this issue occurs because the content of the ipdiscover_analyser rzo GET parameter is concatenated to a string used in an exec() call in the PHP code. Authentication is needed in order to exploit this vulnerability.

EPSS

Процентиль: 82%
0.01736
Низкий