Логотип exploitDog
bind:CVE-2019-17095
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-17095

Количество 3

Количество 3

nvd логотип

CVE-2019-17095

около 6 лет назад

A command injection vulnerability has been discovered in the bootstrap stage of Bitdefender BOX 2, versions 2.1.47.42 and 2.1.53.45. The API method `/api/download_image` unsafely handles the production firmware URL supplied by remote servers, leading to arbitrary execution of system commands. In order to exploit the condition, an unauthenticated attacker should impersonate a infrastructure server to trigger this vulnerability.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-q7rh-4p79-pmmf

больше 3 лет назад

A command injection vulnerability has been discovered in the bootstrap stage of Bitdefender BOX 2, versions 2.1.47.42 and 2.1.53.45. The API method `/api/download_image` unsafely handles the production firmware URL supplied by remote servers, leading to arbitrary execution of system commands. In order to exploit the condition, an unauthenticated attacker should impersonate a infrastructure server to trigger this vulnerability.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2020-00539

около 6 лет назад

Уязвимость устройства для защиты приборов и гаджетов Bitdefender BOX 2, связанная с ошибками обработки URL-адресов методом API /api/download_image, позволяющая нарушителю выполнить произвольные команды в целевой системе

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-17095

A command injection vulnerability has been discovered in the bootstrap stage of Bitdefender BOX 2, versions 2.1.47.42 and 2.1.53.45. The API method `/api/download_image` unsafely handles the production firmware URL supplied by remote servers, leading to arbitrary execution of system commands. In order to exploit the condition, an unauthenticated attacker should impersonate a infrastructure server to trigger this vulnerability.

CVSS3: 8.1
4%
Низкий
около 6 лет назад
github логотип
GHSA-q7rh-4p79-pmmf

A command injection vulnerability has been discovered in the bootstrap stage of Bitdefender BOX 2, versions 2.1.47.42 and 2.1.53.45. The API method `/api/download_image` unsafely handles the production firmware URL supplied by remote servers, leading to arbitrary execution of system commands. In order to exploit the condition, an unauthenticated attacker should impersonate a infrastructure server to trigger this vulnerability.

CVSS3: 9.8
4%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-00539

Уязвимость устройства для защиты приборов и гаджетов Bitdefender BOX 2, связанная с ошибками обработки URL-адресов методом API /api/download_image, позволяющая нарушителю выполнить произвольные команды в целевой системе

CVSS3: 8.1
4%
Низкий
около 6 лет назад

Уязвимостей на страницу