Описание
Wazuh API in Wazuh from 4.0.0 to 4.0.3 allows authenticated users to execute arbitrary code with administrative privileges via /manager/files URI. An authenticated user to the service may exploit incomplete input validation on the /manager/files API to inject arbitrary code within the API service script.
Ссылки
- Release NotesVendor Advisory
- Release NotesThird Party Advisory
- Release NotesVendor Advisory
- Release NotesThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 4.0.0 (включая) до 4.0.3 (включая)
cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:*
EPSS
Процентиль: 98%
0.64023
Средний
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-22
Связанные уязвимости
EPSS
Процентиль: 98%
0.64023
Средний
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-22