Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8xmw-45cw-q6ch

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

HomeAutomation 3.3.2 suffers from an authenticated OS command execution vulnerability using custom command v0.1 plugin. This can be exploited with a CSRF vulnerability to execute arbitrary shell commands as the web user via the 'set_command_on' and 'set_command_off' POST parameters in '/system/systemplugins/customcommand/customcommand.plugin.php' by using an unsanitized PHP exec() function.

HomeAutomation 3.3.2 suffers from an authenticated OS command execution vulnerability using custom command v0.1 plugin. This can be exploited with a CSRF vulnerability to execute arbitrary shell commands as the web user via the 'set_command_on' and 'set_command_off' POST parameters in '/system/systemplugins/customcommand/customcommand.plugin.php' by using an unsanitized PHP exec() function.

EPSS

Процентиль: 78%
0.0117
Низкий

Дефекты

CWE-352

Связанные уязвимости

CVSS3: 8
nvd
почти 5 лет назад

HomeAutomation 3.3.2 suffers from an authenticated OS command execution vulnerability using custom command v0.1 plugin. This can be exploited with a CSRF vulnerability to execute arbitrary shell commands as the web user via the 'set_command_on' and 'set_command_off' POST parameters in '/system/systemplugins/customcommand/customcommand.plugin.php' by using an unsanitized PHP exec() function.

EPSS

Процентиль: 78%
0.0117
Низкий

Дефекты

CWE-352