An authenticated command injection vulnerability exists in IPFire Firewall before 2.21 Core Update 124 in backup.cgi. This allows an authenticated user with privileges for the affected page to execute arbitrary commands.
References
Link | Resource |
---|---|
https://doddsecurity.com/213/command-injection-on-ipfire-firewalls/ | Exploit Vendor Advisory |
https://www.ipfire.org/news/ipfire-2-21-core-update-124-released | Patch Vendor Advisory |
https://doddsecurity.com/213/command-injection-on-ipfire-firewalls/ | Exploit Vendor Advisory |
https://www.ipfire.org/news/ipfire-2-21-core-update-124-released | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://doddsecurity.com/213/command-injection-on-ipfire-firewalls/ - Exploit, Vendor Advisory | |
References | () https://www.ipfire.org/news/ipfire-2-21-core-update-124-released - Patch, Vendor Advisory |
Information
Published : 2018-10-17 14:29
Updated : 2024-11-21 03:52
NVD link : CVE-2018-16232
Mitre link : CVE-2018-16232
CVE.ORG link : CVE-2018-16232
JSON object : View
Products Affected
ipfire
- ipfire
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')