An issue was discovered in Poly (formerly Polycom) HDX 3.1.13. A feature exists that allows the creation of a server / client certificate, or the upload of the user certificate, on the administrator's page. The value received from the user is the factor value of a shell script on the equipment. By entering a special character (such as a single quote) in a CN or other CSR field, one can insert a command into a factor value. A system command can be executed as root.
References
Link | Resource |
---|---|
https://support.polycom.com/content/dam/polycom-support/global/documentation/hdx-3-1-14-advisory.pdf | Patch Vendor Advisory |
https://support.polycom.com/content/dam/polycom-support/global/documentation/hdx-3-1-14-advisory.pdf | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 04:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://support.polycom.com/content/dam/polycom-support/global/documentation/hdx-3-1-14-advisory.pdf - Patch, Vendor Advisory |
Information
Published : 2020-03-12 21:15
Updated : 2024-11-21 04:20
NVD link : CVE-2019-11355
Mitre link : CVE-2019-11355
CVE.ORG link : CVE-2019-11355
JSON object : View
Products Affected
polycom
- hdx_system_software
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')