KRAMER VIAware through August 2021 allows remote attackers to execute arbitrary code because ajaxPages/writeBrowseFilePathAjax.php accepts arbitrary executable pathnames (even though browseSystemFiles.php is no longer reachable via the GUI). NOTE: this issue exists because of an incomplete fix for CVE-2019-17124.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/166623/Kramer-VIAware-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://write-up.github.io/kramerav/ | Third Party Advisory |
http://packetstormsecurity.com/files/166623/Kramer-VIAware-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://write-up.github.io/kramerav/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/166623/Kramer-VIAware-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://write-up.github.io/kramerav/ - Third Party Advisory |
Information
Published : 2021-08-31 04:15
Updated : 2024-11-21 06:13
NVD link : CVE-2021-36356
Mitre link : CVE-2021-36356
CVE.ORG link : CVE-2021-36356
JSON object : View
Products Affected
kramerav
- viaware
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type