Описание
ELOG allows an authenticated user to modify or overwrite the configuration file, resulting in denial of service. If the execute facility is specifically enabled with the "-x" command line flag, attackers could execute OS commands on the host machine. By default, ELOG is not configured to allow shell commands or self-registration.
Ссылки
- Patch
- Patch
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 3.1.5-20251014 (включая)
cpe:2.3:a:elog_project:elog:*:*:*:*:*:*:*:*
EPSS
Процентиль: 18%
0.00057
Низкий
7.1 High
CVSS3
Дефекты
CWE-862
Связанные уязвимости
CVSS3: 7.1
github
3 месяца назад
ELOG allows an authenticated user to modify or overwrite the configuration file, resulting in denial of service. If the execute facility is specifically enabled with the "-x" command line flag, attackers could execute OS commands on the host machine. By default, ELOG is not configured to allow shell commands or self-registration.
EPSS
Процентиль: 18%
0.00057
Низкий
7.1 High
CVSS3
Дефекты
CWE-862