Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p8wr-r5ww-35j3

Опубликовано: 05 фев. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 5.4

Описание

Vintage, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API create_overlay.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

Vintage, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API create_overlay.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

EPSS

Процентиль: 39%
0.00173
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-35
CWE-94

Связанные уязвимости

CVSS3: 5.4
nvd
около 2 лет назад

Vintage, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API create_overlay.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

EPSS

Процентиль: 39%
0.00173
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-35
CWE-94