Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9qpj-2qwq-5f72

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The client in Jetro COCKPIT Secure Browsing (JCSB) 4.3.1 and 4.3.3 does not validate the FileName element in an RDP_FILE_TRANSFER document, which allows remote JCSB servers to execute arbitrary programs by providing a .EXE extension.

The client in Jetro COCKPIT Secure Browsing (JCSB) 4.3.1 and 4.3.3 does not validate the FileName element in an RDP_FILE_TRANSFER document, which allows remote JCSB servers to execute arbitrary programs by providing a .EXE extension.

EPSS

Процентиль: 53%
0.00296
Низкий

Дефекты

CWE-20

Связанные уязвимости

nvd
почти 12 лет назад

The client in Jetro COCKPIT Secure Browsing (JCSB) 4.3.1 and 4.3.3 does not validate the FileName element in an RDP_FILE_TRANSFER document, which allows remote JCSB servers to execute arbitrary programs by providing a .EXE extension.

EPSS

Процентиль: 53%
0.00296
Низкий

Дефекты

CWE-20