Описание
In VembuBDR before 4.2.0.1 and VembuOffsiteDR before 4.2.0.1 installed on Windows, the http API located at /consumerweb/secure/download.php. Using this command argument an unauthenticated attacker can execute arbitrary OS commands with SYSTEM privileges.
Ссылки
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Broken LinkThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Broken LinkThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 4.2.0.1 (исключая)Версия до 4.2.0.1 (исключая)
Одновременно
Одно из
cpe:2.3:a:vembu:bdr_suite:*:*:*:*:*:*:*:*
cpe:2.3:a:vembu:offsite_dr:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
EPSS
Процентиль: 93%
0.10709
Средний
10 Critical
CVSS3
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-78
Связанные уязвимости
CVSS3: 9.8
github
больше 3 лет назад
Vembu BDR Suite before 4.2.0 allows Unauthenticated Remote Code Execution by placing a command in a GET request (issue 2 of 2).
EPSS
Процентиль: 93%
0.10709
Средний
10 Critical
CVSS3
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-78