Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pg54-ccpq-c42c

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In MobaXterm 11.1 and 12.1, the protocol handler is vulnerable to command injection. A crafted link can trigger a popup asking whether the user wants to run MobaXterm to handle the link. If accepted, another popup appears asking for further confirmation. If this is also accepted, command execution is achieved, as demonstrated by the MobaXterm://calc URI.

In MobaXterm 11.1 and 12.1, the protocol handler is vulnerable to command injection. A crafted link can trigger a popup asking whether the user wants to run MobaXterm to handle the link. If accepted, another popup appears asking for further confirmation. If this is also accepted, command execution is achieved, as demonstrated by the MobaXterm://calc URI.

EPSS

Процентиль: 65%
0.00497
Низкий

Связанные уязвимости

CVSS3: 8.8
nvd
больше 6 лет назад

In MobaXterm 11.1 and 12.1, the protocol handler is vulnerable to command injection. A crafted link can trigger a popup asking whether the user wants to run MobaXterm to handle the link. If accepted, another popup appears asking for further confirmation. If this is also accepted, command execution is achieved, as demonstrated by the MobaXterm://`calc` URI.

EPSS

Процентиль: 65%
0.00497
Низкий