Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-14947

Опубликовано: 30 июн. 2020
Источник: debian

Описание

OCS Inventory NG 2.7 allows Remote Command Execution via shell metacharacters to require/commandLine/CommandLine.php because mib_file in plugins/main_sections/ms_config/ms_snmp_config.php is mishandled in get_mib_oid.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ocsinventory-servernot-affectedpackage

Примечания

  • Introduced in: https://github.com/OCSInventory-NG/OCSInventory-ocsreports/commit/73003df3e5021d8ff094cd4e5b8abb851c99d2ae (2.7)

  • Fixed by: https://github.com/OCSInventory-NG/OCSInventory-ocsreports/commit/da72e0fddaeceee44fbbd7241e07e5d53d1eee64 (2.8)

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 5 лет назад

OCS Inventory NG 2.7 allows Remote Command Execution via shell metacharacters to require/commandLine/CommandLine.php because mib_file in plugins/main_sections/ms_config/ms_snmp_config.php is mishandled in get_mib_oid.

CVSS3: 8.8
nvd
больше 5 лет назад

OCS Inventory NG 2.7 allows Remote Command Execution via shell metacharacters to require/commandLine/CommandLine.php because mib_file in plugins/main_sections/ms_config/ms_snmp_config.php is mishandled in get_mib_oid.

CVSS3: 8.8
github
больше 3 лет назад

OCS Inventory NG 2.7 allows Remote Command Execution via shell metacharacters to require/commandLine/CommandLine.php because mib_file in plugins/main_sections/ms_config/ms_snmp_config.php is mishandled in get_mib_oid.