CVE-2020-11016

IntelMQ Manager from version 1.1.0 and before version 2.1.1 has a vulnerability where the backend incorrectly handled messages given by user-input in the "send" functionality of the Inspect-tool of the Monitor component. An attacker with access to the IntelMQ Manager could possibly use this issue to execute arbitrary code with the privileges of the webserver. Version 2.1.1 fixes the vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:intelmq_manager_project:intelmq_manager:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:56

Type Values Removed Values Added
References () https://github.com/certtools/intelmq-manager/commit/b9a2ac43a4f99d764b827108f6a99dc4a9faa013 - Patch, Third Party Advisory () https://github.com/certtools/intelmq-manager/commit/b9a2ac43a4f99d764b827108f6a99dc4a9faa013 - Patch, Third Party Advisory
References () https://github.com/certtools/intelmq-manager/releases/tag/2.1.1 - Third Party Advisory () https://github.com/certtools/intelmq-manager/releases/tag/2.1.1 - Third Party Advisory
References () https://github.com/certtools/intelmq-manager/security/advisories/GHSA-rrhh-rcgp-q2m2 - Patch, Third Party Advisory () https://github.com/certtools/intelmq-manager/security/advisories/GHSA-rrhh-rcgp-q2m2 - Patch, Third Party Advisory
References () https://lists.cert.at/pipermail/intelmq-users/2020-April/000161.html - Third Party Advisory () https://lists.cert.at/pipermail/intelmq-users/2020-April/000161.html - Third Party Advisory
CVSS v2 : 6.5
v3 : 8.8
v2 : 6.5
v3 : 9.1

Information

Published : 2020-04-30 23:15

Updated : 2024-11-21 04:56


NVD link : CVE-2020-11016

Mitre link : CVE-2020-11016

CVE.ORG link : CVE-2020-11016


JSON object : View

Products Affected

intelmq_manager_project

  • intelmq_manager
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')