Логотип exploitDog
bind:CVE-2016-10043
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2016-10043

Количество 3

Количество 3

nvd логотип

CVE-2016-10043

около 9 лет назад

An issue was discovered in Radisys MRF Web Panel (SWMS) 9.0.1. The MSM_MACRO_NAME POST parameter in /swms/ms.cgi was discovered to be vulnerable to OS command injection attacks. It is possible to use the pipe character (|) to inject arbitrary OS commands and retrieve the output in the application's responses. Attackers could execute unauthorized commands, which could then be used to disable the software, or read, write, and modify data for which the attacker does not have permissions to access directly. Since the targeted application is directly executing the commands instead of the attacker, any malicious activities may appear to come from the application or the application's owner (apache user).

CVSS3: 10
EPSS: Средний
github логотип

GHSA-895q-967v-4mxx

больше 3 лет назад

An issue was discovered in Radisys MRF Web Panel (SWMS) 9.0.1. The MSM_MACRO_NAME POST parameter in /swms/ms.cgi was discovered to be vulnerable to OS command injection attacks. It is possible to use the pipe character (|) to inject arbitrary OS commands and retrieve the output in the application's responses. Attackers could execute unauthorized commands, which could then be used to disable the software, or read, write, and modify data for which the attacker does not have permissions to access directly. Since the targeted application is directly executing the commands instead of the attacker, any malicious activities may appear to come from the application or the application's owner (apache user).

CVSS3: 10
EPSS: Средний
fstec логотип

BDU:2017-02539

около 9 лет назад

Уязвимость сценария ms.cgi (/swms/ms.cgi) веб-приложения MRF Web Panel, позволяющая нарушителю выполнять произвольные команды операционной системы

CVSS3: 10
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2016-10043

An issue was discovered in Radisys MRF Web Panel (SWMS) 9.0.1. The MSM_MACRO_NAME POST parameter in /swms/ms.cgi was discovered to be vulnerable to OS command injection attacks. It is possible to use the pipe character (|) to inject arbitrary OS commands and retrieve the output in the application's responses. Attackers could execute unauthorized commands, which could then be used to disable the software, or read, write, and modify data for which the attacker does not have permissions to access directly. Since the targeted application is directly executing the commands instead of the attacker, any malicious activities may appear to come from the application or the application's owner (apache user).

CVSS3: 10
38%
Средний
около 9 лет назад
github логотип
GHSA-895q-967v-4mxx

An issue was discovered in Radisys MRF Web Panel (SWMS) 9.0.1. The MSM_MACRO_NAME POST parameter in /swms/ms.cgi was discovered to be vulnerable to OS command injection attacks. It is possible to use the pipe character (|) to inject arbitrary OS commands and retrieve the output in the application's responses. Attackers could execute unauthorized commands, which could then be used to disable the software, or read, write, and modify data for which the attacker does not have permissions to access directly. Since the targeted application is directly executing the commands instead of the attacker, any malicious activities may appear to come from the application or the application's owner (apache user).

CVSS3: 10
38%
Средний
больше 3 лет назад
fstec логотип
BDU:2017-02539

Уязвимость сценария ms.cgi (/swms/ms.cgi) веб-приложения MRF Web Panel, позволяющая нарушителю выполнять произвольные команды операционной системы

CVSS3: 10
38%
Средний
около 9 лет назад

Уязвимостей на страницу