Логотип exploitDog
bind:CVE-2016-9682
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2016-9682

Количество 3

Количество 3

nvd логотип

CVE-2016-9682

почти 9 лет назад

The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to two Remote Command Injection vulnerabilities in its web administrative interface. These vulnerabilities occur in the diagnostics CGI (/cgi-bin/diagnostics) component responsible for emailing out information about the state of the system. The application doesn't properly escape the information passed in the 'tsrDeleteRestartedFile' or 'currentTSREmailTo' variables before making a call to system(), allowing for remote command injection. Exploitation of this vulnerability yields shell access to the remote machine under the nobody user account.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-64w8-g7qm-5gc2

больше 3 лет назад

The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to two Remote Command Injection vulnerabilities in its web administrative interface. These vulnerabilities occur in the diagnostics CGI (/cgi-bin/diagnostics) component responsible for emailing out information about the state of the system. The application doesn't properly escape the information passed in the 'tsrDeleteRestartedFile' or 'currentTSREmailTo' variables before making a call to system(), allowing for remote command injection. Exploitation of this vulnerability yields shell access to the remote machine under the nobody user account.

CVSS3: 9.8
EPSS: Средний
fstec логотип

BDU:2017-02583

почти 9 лет назад

Уязвимость компонента «diagnostics» CGI-приложения веб-интерфейса администрирования сервера системы удаленного доступа Sonicwall Secure Remote Access, позволяющая нарушителю выполнять произвольные команды

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2016-9682

The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to two Remote Command Injection vulnerabilities in its web administrative interface. These vulnerabilities occur in the diagnostics CGI (/cgi-bin/diagnostics) component responsible for emailing out information about the state of the system. The application doesn't properly escape the information passed in the 'tsrDeleteRestartedFile' or 'currentTSREmailTo' variables before making a call to system(), allowing for remote command injection. Exploitation of this vulnerability yields shell access to the remote machine under the nobody user account.

CVSS3: 9.8
20%
Средний
почти 9 лет назад
github логотип
GHSA-64w8-g7qm-5gc2

The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to two Remote Command Injection vulnerabilities in its web administrative interface. These vulnerabilities occur in the diagnostics CGI (/cgi-bin/diagnostics) component responsible for emailing out information about the state of the system. The application doesn't properly escape the information passed in the 'tsrDeleteRestartedFile' or 'currentTSREmailTo' variables before making a call to system(), allowing for remote command injection. Exploitation of this vulnerability yields shell access to the remote machine under the nobody user account.

CVSS3: 9.8
20%
Средний
больше 3 лет назад
fstec логотип
BDU:2017-02583

Уязвимость компонента «diagnostics» CGI-приложения веб-интерфейса администрирования сервера системы удаленного доступа Sonicwall Secure Remote Access, позволяющая нарушителю выполнять произвольные команды

CVSS3: 9.8
20%
Средний
почти 9 лет назад

Уязвимостей на страницу