Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w88r-jmxq-9fpj

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Admin web application in Kinetica 7.0.9.2.20191118151947 does not properly sanitise the input for the function getLogs. This lack of sanitisation could be exploited to allow an authenticated attacker to run remote code on the underlying operating system. The logFile parameter in the getLogs function was used as a variable in a command to read log files; however, due to poor input sanitisation, it was possible to bypass a replacement and break out of the command.

The Admin web application in Kinetica 7.0.9.2.20191118151947 does not properly sanitise the input for the function getLogs. This lack of sanitisation could be exploited to allow an authenticated attacker to run remote code on the underlying operating system. The logFile parameter in the getLogs function was used as a variable in a command to read log files; however, due to poor input sanitisation, it was possible to bypass a replacement and break out of the command.

EPSS

Процентиль: 63%
0.00451
Низкий

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 8.8
nvd
почти 6 лет назад

The Admin web application in Kinetica 7.0.9.2.20191118151947 does not properly sanitise the input for the function getLogs. This lack of sanitisation could be exploited to allow an authenticated attacker to run remote code on the underlying operating system. The logFile parameter in the getLogs function was used as a variable in a command to read log files; however, due to poor input sanitisation, it was possible to bypass a replacement and break out of the command.

EPSS

Процентиль: 63%
0.00451
Низкий

Дефекты

CWE-20