CVE-2020-8429

The Admin web application in Kinetica 7.0.9.2.20191118151947 does not properly sanitise the input for the function getLogs. This lack of sanitisation could be exploited to allow an authenticated attacker to run remote code on the underlying operating system. The logFile parameter in the getLogs function was used as a variable in a command to read log files; however, due to poor input sanitisation, it was possible to bypass a replacement and break out of the command.
Configurations

Configuration 1 (hide)

cpe:2.3:a:kinetica:kinetica:7.0.9.2.20191118151947:*:*:*:*:*:*:*

History

21 Nov 2024, 05:38

Type Values Removed Values Added
References () https://support.kinetica.com/hc/en-us/categories/360001223653-Release-Notes - Release Notes, Vendor Advisory () https://support.kinetica.com/hc/en-us/categories/360001223653-Release-Notes - Release Notes, Vendor Advisory
References () https://www.nccgroup.trust/uk/our-research/technical-advisory-command-injection/?research=Technical+advisories - Exploit, Third Party Advisory () https://www.nccgroup.trust/uk/our-research/technical-advisory-command-injection/?research=Technical+advisories - Exploit, Third Party Advisory

Information

Published : 2020-02-11 18:15

Updated : 2024-11-21 05:38


NVD link : CVE-2020-8429

Mitre link : CVE-2020-8429

CVE.ORG link : CVE-2020-8429


JSON object : View

Products Affected

kinetica

  • kinetica
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')