Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g5c2-jrx4-6f3w

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

delivery.php in the Passive Capture Application (PCA) web console in IBM Tealeaf CX 7.x, 8.x through 8.6, 8.7 before FP2, and 8.8 before FP2 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the testconn_host parameter.

delivery.php in the Passive Capture Application (PCA) web console in IBM Tealeaf CX 7.x, 8.x through 8.6, 8.7 before FP2, and 8.8 before FP2 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the testconn_host parameter.

EPSS

Процентиль: 91%
0.06372
Низкий

Дефекты

CWE-78

Связанные уязвимости

nvd
почти 12 лет назад

delivery.php in the Passive Capture Application (PCA) web console in IBM Tealeaf CX 7.x, 8.x through 8.6, 8.7 before FP2, and 8.8 before FP2 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the testconn_host parameter.

EPSS

Процентиль: 91%
0.06372
Низкий

Дефекты

CWE-78