Описание
openmediavault before 4.1.36 and 5.x before 5.5.12 allows authenticated PHP code injection attacks, via the sortfield POST parameter of rpc.php, because json_encode_safe is not used in config/databasebackend.inc. Successful exploitation allows arbitrary command execution on the underlying operating system as root.
Ссылки
- ExploitThird Party AdvisoryVDB Entry
- PatchThird Party Advisory
- Vendor Advisory
- ExploitThird Party AdvisoryVDB Entry
- PatchThird Party Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 4.1.36 (исключая)Версия от 5.0.0 (включая) до 5.5.12 (исключая)
Одно из
cpe:2.3:a:openmediavault:openmediavault:*:*:*:*:*:*:*:*
cpe:2.3:a:openmediavault:openmediavault:*:*:*:*:*:*:*:*
EPSS
Процентиль: 99%
0.80279
Высокий
8.8 High
CVSS3
9 Critical
CVSS2
Дефекты
CWE-94
Связанные уязвимости
github
больше 3 лет назад
openmediavault before 4.1.36 and 5.x before 5.5.12 allows authenticated PHP code injection attacks, via the sortfield POST parameter of rpc.php, because json_encode_safe is not used in config/databasebackend.inc. Successful exploitation allows arbitrary command execution on the underlying operating system as root.
EPSS
Процентиль: 99%
0.80279
Высокий
8.8 High
CVSS3
9 Critical
CVSS2
Дефекты
CWE-94