Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h3fp-5w83-8rcj

Опубликовано: 09 июл. 2024
Источник: github
Github: Не прошло ревью
CVSS4: 7.5
CVSS3: 6.6

Описание

A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 HF1). The system service of affected applications is vulnerable to command injection due to missing server side input sanitation when loading VPN configurations. This could allow an administrative remote attacker running a corresponding SINEMA Remote Connect Server to execute arbitrary code with system privileges on the client system.

A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 HF1). The system service of affected applications is vulnerable to command injection due to missing server side input sanitation when loading VPN configurations. This could allow an administrative remote attacker running a corresponding SINEMA Remote Connect Server to execute arbitrary code with system privileges on the client system.

EPSS

Процентиль: 84%
0.02116
Низкий

7.5 High

CVSS4

6.6 Medium

CVSS3

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 6.6
nvd
больше 1 года назад

A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 HF1). The system service of affected applications is vulnerable to command injection due to missing server side input sanitation when loading VPN configurations. This could allow an administrative remote attacker running a corresponding SINEMA Remote Connect Server to execute arbitrary code with system privileges on the client system.

CVSS3: 6.6
fstec
больше 1 года назад

Уязвимость клиента VPN-сервиса SINEMA Remote Connect, связанная с непринятием мер по чистке данных на управляющем уровне, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 84%
0.02116
Низкий

7.5 High

CVSS4

6.6 Medium

CVSS3

Дефекты

CWE-77