cgi-cpn/xcoding/prontus_videocut.cgi in AltaVoz Prontus (aka ProntusCMS) through 12.0.3.0 has "Improper Neutralization of Special Elements used in an OS Command," allowing attackers to execute OS commands via an HTTP GET parameter.
References
Link | Resource |
---|---|
https://blog.nivel4.com/investigaciones/vulnerabilidad-de-ejecucion-de-comandos-remotos-rce-en-prontuscms/ | Third Party Advisory |
https://blog.nivel4.com/investigaciones/vulnerabilidad-de-ejecucion-de-comandos-remotos-rce-en-prontuscms/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 04:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.nivel4.com/investigaciones/vulnerabilidad-de-ejecucion-de-comandos-remotos-rce-en-prontuscms/ - Third Party Advisory |
Information
Published : 2019-08-26 18:15
Updated : 2024-11-21 04:28
NVD link : CVE-2019-15503
Mitre link : CVE-2019-15503
CVE.ORG link : CVE-2019-15503
JSON object : View
Products Affected
altavoz
- prontuscms
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')