Tenable Appliance 3.5 - 4.4.0, and possibly prior versions, contains a flaw in the simpleupload.py script in the Web UI. Through the manipulation of the tns_appliance_session_user parameter, a remote attacker can inject arbitrary commands.
References
Link | Resource |
---|---|
http://www.tenable.com/security/tns-2017-07 | Patch Vendor Advisory |
https://vulndb.cyberriskanalytics.com/153135 | Permissions Required |
https://www.exploit-db.com/exploits/41892/ | Exploit Third Party Advisory VDB Entry |
http://www.tenable.com/security/tns-2017-07 | Patch Vendor Advisory |
https://vulndb.cyberriskanalytics.com/153135 | Permissions Required |
https://www.exploit-db.com/exploits/41892/ | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.tenable.com/security/tns-2017-07 - Patch, Vendor Advisory | |
References | () https://vulndb.cyberriskanalytics.com/153135 - Permissions Required | |
References | () https://www.exploit-db.com/exploits/41892/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2017-04-21 18:59
Updated : 2024-11-21 03:33
NVD link : CVE-2017-8051
Mitre link : CVE-2017-8051
CVE.ORG link : CVE-2017-8051
JSON object : View
Products Affected
tenable
- appliance
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')