CVE-2019-5916

Input validation issue in POWER EGG(Ver 2.0.1, Ver 2.02 Patch 3 and earlier, Ver 2.1 Patch 4 and earlier, Ver 2.2 Patch 7 and earlier, Ver 2.3 Patch 9 and earlier, Ver 2.4 Patch 13 and earlier, Ver 2.5 Patch 12 and earlier, Ver 2.6 Patch 8 and earlier, Ver 2.7 Patch 6 and earlier, Ver 2.7 Government Edition Patch 7 and earlier, Ver 2.8 Patch 6 and earlier, Ver 2.8c Patch 5 and earlier, Ver 2.9 Patch 4 and earlier) allows remote attackers to execute EL expression on the server via unspecified vectors.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:d-circle:power_egg:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:d-circle:power_egg:2.0.2:patch3:*:*:*:*:*:*
cpe:2.3:a:d-circle:power_egg:2.1:patch4:*:*:*:*:*:*
cpe:2.3:a:d-circle:power_egg:2.2:patch7:*:*:*:*:*:*
cpe:2.3:a:d-circle:power_egg:2.3:patch9:*:*:*:*:*:*
cpe:2.3:a:d-circle:power_egg:2.4:patch13:*:*:*:*:*:*
cpe:2.3:a:d-circle:power_egg:2.5:patch12:*:*:*:*:*:*
cpe:2.3:a:d-circle:power_egg:2.6:patch8:*:*:*:*:*:*
cpe:2.3:a:d-circle:power_egg:2.7:patch6:*:*:*:*:*:*
cpe:2.3:a:d-circle:power_egg:2.7:patch7:*:*:government:*:*:*
cpe:2.3:a:d-circle:power_egg:2.8:patch6:*:*:*:*:*:*
cpe:2.3:a:d-circle:power_egg:2.8c:patch5:*:*:*:*:*:*
cpe:2.3:a:d-circle:power_egg:2.9:patch4:*:*:*:*:*:*

History

21 Nov 2024, 04:45

Type Values Removed Values Added
References () http://jvn.jp/en/jp/JVN63860183/index.html - Third Party Advisory () http://jvn.jp/en/jp/JVN63860183/index.html - Third Party Advisory
References () https://poweregg.d-circle.com/support/package/important/20190204_000780/ - Vendor Advisory () https://poweregg.d-circle.com/support/package/important/20190204_000780/ - Vendor Advisory

Information

Published : 2019-02-13 18:29

Updated : 2024-11-21 04:45


NVD link : CVE-2019-5916

Mitre link : CVE-2019-5916

CVE.ORG link : CVE-2019-5916


JSON object : View

Products Affected

d-circle

  • power_egg
CWE
CWE-917

Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')