op5config/welcome in system-op5config before 2.0.3 in op5 Monitor and op5 Appliance before 5.5.3 allows remote attackers to execute arbitrary commands via shell metacharacters in the password parameter.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2012/Jan/62 - | |
References | () http://secunia.com/advisories/47417 - Vendor Advisory | |
References | () http://www.ekelow.se/file_uploads/Advisories/ekelow-aid-2012-01.pdf - Exploit | |
References | () http://www.op5.com/news/support-news/fixed-vulnerabilities-op5-monitor-op5-appliance/ - | |
References | () http://www.osvdb.org/78065 - | |
References | () https://bugs.op5.com/view.php?id=5094 - |
Information
Published : 2013-12-31 20:55
Updated : 2024-11-21 01:34
NVD link : CVE-2012-0262
Mitre link : CVE-2012-0262
CVE.ORG link : CVE-2012-0262
JSON object : View
Products Affected
op5
- system-op5config
- monitor
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')