Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v6xw-2vgr-375p

Опубликовано: 25 июл. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 9.4

Описание

A command injection vulnerability exists in the eScan Web Management Console version 5.5-2. The application fails to properly sanitize the 'pass' parameter when processing login requests to login.php, allowing an authenticated attacker with a valid username to inject arbitrary commands via a specially crafted password value. Successful exploitation results in remote code execution. Privilege escalation to root is possible by abusing the runasroot utility with mwconf-level privileges.

A command injection vulnerability exists in the eScan Web Management Console version 5.5-2. The application fails to properly sanitize the 'pass' parameter when processing login requests to login.php, allowing an authenticated attacker with a valid username to inject arbitrary commands via a specially crafted password value. Successful exploitation results in remote code execution. Privilege escalation to root is possible by abusing the runasroot utility with mwconf-level privileges.

EPSS

Процентиль: 97%
0.43016
Средний

9.4 Critical

CVSS4

Дефекты

CWE-78

Связанные уязвимости

nvd
7 месяцев назад

A command injection vulnerability exists in the eScan Web Management Console version 5.5-2. The application fails to properly sanitize the 'pass' parameter when processing login requests to login.php, allowing an authenticated attacker with a valid username to inject arbitrary commands via a specially crafted password value. Successful exploitation results in remote code execution. Privilege escalation to root is possible by abusing the runasroot utility with mwconf-level privileges.

EPSS

Процентиль: 97%
0.43016
Средний

9.4 Critical

CVSS4

Дефекты

CWE-78