Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xcf5-m6c7-75hg

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

CMCAgent in NCR Command Center Agent 16.3 on Aloha POS/BOH servers permits the submission of a runCommand parameter (within an XML document sent to port 8089) that enables the remote, unauthenticated execution of an arbitrary command as SYSTEM, as exploited in the wild in 2020 and/or 2021. NOTE: the vendor's position is that exploitation occurs only on devices with a certain "misconfiguration."

CMCAgent in NCR Command Center Agent 16.3 on Aloha POS/BOH servers permits the submission of a runCommand parameter (within an XML document sent to port 8089) that enables the remote, unauthenticated execution of an arbitrary command as SYSTEM, as exploited in the wild in 2020 and/or 2021. NOTE: the vendor's position is that exploitation occurs only on devices with a certain "misconfiguration."

EPSS

Процентиль: 99%
0.87096
Высокий

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 9.8
nvd
около 5 лет назад

CMCAgent in NCR Command Center Agent 16.3 on Aloha POS/BOH servers permits the submission of a runCommand parameter (within an XML document sent to port 8089) that enables the remote, unauthenticated execution of an arbitrary command as SYSTEM, as exploited in the wild in 2020 and/or 2021. NOTE: the vendor's position is that exploitation occurs only on devices with a certain "misconfiguration."

EPSS

Процентиль: 99%
0.87096
Высокий

Дефекты

CWE-78