Multiple command injection vulnerabilities in NeDi before 1.7Cp3 allow authenticated users to execute code on the server side via the flt parameter to Nodes-Traffic.php, the dv parameter to Devices-Graph.php, or the tit parameter to drawmap.php.
References
Link | Resource |
---|---|
https://www.nedi.ch/end-of-year-update/ | Vendor Advisory |
https://www.sakerhetskontoret.com/disclosures/nedi/report.html | Exploit Third Party Advisory |
https://www.nedi.ch/end-of-year-update/ | Vendor Advisory |
https://www.sakerhetskontoret.com/disclosures/nedi/report.html | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.nedi.ch/end-of-year-update/ - Vendor Advisory | |
References | () https://www.sakerhetskontoret.com/disclosures/nedi/report.html - Exploit, Third Party Advisory |
Information
Published : 2019-01-17 02:29
Updated : 2024-11-21 04:02
NVD link : CVE-2018-20727
Mitre link : CVE-2018-20727
CVE.ORG link : CVE-2018-20727
JSON object : View
Products Affected
nedi
- nedi
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')