Описание
In the wazuh-slack active response script in Wazuh 4.2.x before 4.2.5, untrusted user agents are passed to a curl command line, potentially resulting in remote code execution.
Ссылки
- ExploitIssue TrackingMitigationThird Party Advisory
- Issue TrackingPatchThird Party Advisory
- PatchThird Party Advisory
- ExploitIssue TrackingMitigationThird Party Advisory
- Issue TrackingPatchThird Party Advisory
- PatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 4.2.0 (включая) до 4.2.5 (исключая)
cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:*
EPSS
Процентиль: 92%
0.08313
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-77
Связанные уязвимости
github
больше 3 лет назад
In the wazuh-slack active response script in Wazuh before 4.2.5, untrusted user agents are passed to a curl command line, potentially resulting in remote code execution.
EPSS
Процентиль: 92%
0.08313
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-77