A log poisoning vulnerability has been discovered in the OneShield Policy (Dragon Core) framework before 5.1.10. Authenticated remote adversaries can poison log files by entering malicious payloads in either headers or form elements. These payloads are then executed via a client side debugging console. This is predicated on the debugging console and Java Bean being made available to the deployed application.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2019/May/1 | Mailing List Third Party Advisory |
https://oneshield.com/business-solutions/oneshield-pc-solutions/oneshield-policy/ | Product Vendor Advisory |
http://seclists.org/fulldisclosure/2019/May/1 | Mailing List Third Party Advisory |
https://oneshield.com/business-solutions/oneshield-pc-solutions/oneshield-policy/ | Product Vendor Advisory |
Configurations
History
21 Nov 2024, 04:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2019/May/1 - Mailing List, Third Party Advisory | |
References | () https://oneshield.com/business-solutions/oneshield-pc-solutions/oneshield-policy/ - Product, Vendor Advisory |
Information
Published : 2019-05-08 16:29
Updated : 2024-11-21 04:21
NVD link : CVE-2019-11642
Mitre link : CVE-2019-11642
CVE.ORG link : CVE-2019-11642
JSON object : View
Products Affected
oneshield
- oneshield_policy
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')