Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q7rh-4p79-pmmf

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

A command injection vulnerability has been discovered in the bootstrap stage of Bitdefender BOX 2, versions 2.1.47.42 and 2.1.53.45. The API method /api/download_image unsafely handles the production firmware URL supplied by remote servers, leading to arbitrary execution of system commands. In order to exploit the condition, an unauthenticated attacker should impersonate a infrastructure server to trigger this vulnerability.

A command injection vulnerability has been discovered in the bootstrap stage of Bitdefender BOX 2, versions 2.1.47.42 and 2.1.53.45. The API method /api/download_image unsafely handles the production firmware URL supplied by remote servers, leading to arbitrary execution of system commands. In order to exploit the condition, an unauthenticated attacker should impersonate a infrastructure server to trigger this vulnerability.

EPSS

Процентиль: 89%
0.04414
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 8.1
nvd
около 6 лет назад

A command injection vulnerability has been discovered in the bootstrap stage of Bitdefender BOX 2, versions 2.1.47.42 and 2.1.53.45. The API method `/api/download_image` unsafely handles the production firmware URL supplied by remote servers, leading to arbitrary execution of system commands. In order to exploit the condition, an unauthenticated attacker should impersonate a infrastructure server to trigger this vulnerability.

CVSS3: 8.1
fstec
около 6 лет назад

Уязвимость устройства для защиты приборов и гаджетов Bitdefender BOX 2, связанная с ошибками обработки URL-адресов методом API /api/download_image, позволяющая нарушителю выполнить произвольные команды в целевой системе

EPSS

Процентиль: 89%
0.04414
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-78