Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vxcv-gc68-4r3q

Опубликовано: 11 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 9.4

Описание

Openfiler v2.x contains a command injection vulnerability in the system.html page. The device parameter is used to instantiate a NetworkCard object, whose constructor in network.inc calls exec() with unsanitized input. An authenticated attacker can exploit this to execute arbitrary commands as the openfiler user. Due to misconfigured sudoers, the openfiler user can escalate privileges to root via sudo /bin/bash without a password.

Openfiler v2.x contains a command injection vulnerability in the system.html page. The device parameter is used to instantiate a NetworkCard object, whose constructor in network.inc calls exec() with unsanitized input. An authenticated attacker can exploit this to execute arbitrary commands as the openfiler user. Due to misconfigured sudoers, the openfiler user can escalate privileges to root via sudo /bin/bash without a password.

EPSS

Процентиль: 98%
0.52227
Средний

9.4 Critical

CVSS4

Дефекты

CWE-78

Связанные уязвимости

nvd
6 месяцев назад

Openfiler v2.x contains a command injection vulnerability in the system.html page. The device parameter is used to instantiate a NetworkCard object, whose constructor in network.inc calls exec() with unsanitized input. An authenticated attacker can exploit this to execute arbitrary commands as the openfiler user. Due to misconfigured sudoers, the openfiler user can escalate privileges to root via sudo /bin/bash without a password.

EPSS

Процентиль: 98%
0.52227
Средний

9.4 Critical

CVSS4

Дефекты

CWE-78