Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f9jv-w5v2-f33c

Опубликовано: 15 фев. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

Kardex Mlog MCC 5.7.12+0-a203c2a213-master allows remote code execution. It spawns a web interface listening on port 8088. A user-controllable path is handed to a path-concatenation method (Path.Combine from .NET) without proper sanitisation. This yields the possibility of including local files, as well as remote files on SMB shares. If one provides a file with the extension .t4, it is rendered with the .NET templating engine mono/t4, which can execute code.

Kardex Mlog MCC 5.7.12+0-a203c2a213-master allows remote code execution. It spawns a web interface listening on port 8088. A user-controllable path is handed to a path-concatenation method (Path.Combine from .NET) without proper sanitisation. This yields the possibility of including local files, as well as remote files on SMB shares. If one provides a file with the extension .t4, it is rendered with the .NET templating engine mono/t4, which can execute code.

EPSS

Процентиль: 98%
0.66811
Средний

9.8 Critical

CVSS3

Дефекты

CWE-94

Связанные уязвимости

CVSS3: 9.8
nvd
почти 3 года назад

Kardex Mlog MCC 5.7.12+0-a203c2a213-master allows remote code execution. It spawns a web interface listening on port 8088. A user-controllable path is handed to a path-concatenation method (Path.Combine from .NET) without proper sanitisation. This yields the possibility of including local files, as well as remote files on SMB shares. If one provides a file with the extension .t4, it is rendered with the .NET templating engine mono/t4, which can execute code.

CVSS3: 9.6
fstec
почти 3 года назад

Уязвимость метод Path.Combine модульного программного решения для управления материальными потоками и процессами управления складом Kardex Mlog Control Center (MCC), позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 98%
0.66811
Средний

9.8 Critical

CVSS3

Дефекты

CWE-94