An issue was discovered on KONE Group Controller (KGC) devices before 4.6.5. Unauthenticated Local File Inclusion and File modification is possible through the open HTTP interface by modifying the name parameter of the file endpoint, aka KONE-02.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/149252/KONE-KGC-4.6.4-DoS-Code-Execution-LFI-Bypass.html | Exploit Third Party Advisory VDB Entry |
https://www.kone.com/en/vulnerability.aspx | Vendor Advisory |
http://packetstormsecurity.com/files/149252/KONE-KGC-4.6.4-DoS-Code-Execution-LFI-Bypass.html | Exploit Third Party Advisory VDB Entry |
https://www.kone.com/en/vulnerability.aspx | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/149252/KONE-KGC-4.6.4-DoS-Code-Execution-LFI-Bypass.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.kone.com/en/vulnerability.aspx - Vendor Advisory |
Information
Published : 2018-09-07 22:29
Updated : 2024-11-21 03:50
NVD link : CVE-2018-15486
Mitre link : CVE-2018-15486
CVE.ORG link : CVE-2018-15486
JSON object : View
Products Affected
kone
- group_controller
- group_controller_firmware
CWE
CWE-829
Inclusion of Functionality from Untrusted Control Sphere