In app/Controller/ServersController.php in MISP 2.4.87, a server setting permitted the override of a path variable on certain Red Hed Enterprise Linux and CentOS systems (where rh_shell_fix was enabled), and consequently allowed site admins to inject arbitrary OS commands. The impact is limited by the setting being only accessible to the site administrator.
References
Link | Resource |
---|---|
https://github.com/MISP/MISP/commit/0a2aa9d52492d960b9a161160acedbe9caaa4126 | Patch Third Party Advisory |
https://github.com/MISP/MISP/commit/0a2aa9d52492d960b9a161160acedbe9caaa4126 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 04:11
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/MISP/MISP/commit/0a2aa9d52492d960b9a161160acedbe9caaa4126 - Patch, Third Party Advisory |
Information
Published : 2018-02-12 17:29
Updated : 2024-11-21 04:11
NVD link : CVE-2018-6926
Mitre link : CVE-2018-6926
CVE.ORG link : CVE-2018-6926
JSON object : View
Products Affected
misp
- misp
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')