CVE-2019-11689

An issue was discovered in ASUSTOR exFAT Driver through 1.0.0.r20. When conducting license validation, exfat.cgi and exfatctl fail to properly validate server responses and pass unsanitized text to the system shell, resulting in code execution as root.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:asustor:exfat_driver:1.0.0:r14:*:*:*:*:*:*
cpe:2.3:a:asustor:exfat_driver:1.0.0:r15:*:*:*:*:*:*
cpe:2.3:a:asustor:exfat_driver:1.0.0:r20:*:*:*:*:*:*

History

21 Nov 2024, 04:21

Type Values Removed Values Added
References () https://github.com/mikedamm/CVEs/blob/master/CVE-2019-11688.md - Exploit, Third Party Advisory () https://github.com/mikedamm/CVEs/blob/master/CVE-2019-11688.md - Exploit, Third Party Advisory
References () https://www.asustor.com/app_central/app_detail?id=776 - Vendor Advisory () https://www.asustor.com/app_central/app_detail?id=776 - Vendor Advisory

Information

Published : 2020-03-18 15:15

Updated : 2024-11-21 04:21


NVD link : CVE-2019-11689

Mitre link : CVE-2019-11689

CVE.ORG link : CVE-2019-11689


JSON object : View

Products Affected

asustor

  • exfat_driver
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')