CVE-2021-37444

NCH IVM Attendant v5.12 and earlier suffers from a directory traversal weakness upon uploading plugins in a ZIP archive. This can lead to code execution if a ZIP element's pathname is set to a Windows startup folder, a file for the inbuilt Out-Going Message function, or a file for the the inbuilt Autodial function.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nchsoftware:ivm_attendant:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:15

Type Values Removed Values Added
References () https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_RCE.md - Third Party Advisory () https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_RCE.md - Third Party Advisory
References () https://www.nch.com.au/ivm/index.html - Product () https://www.nch.com.au/ivm/index.html - Product

Information

Published : 2021-07-25 22:15

Updated : 2024-11-21 06:15


NVD link : CVE-2021-37444

Mitre link : CVE-2021-37444

CVE.ORG link : CVE-2021-37444


JSON object : View

Products Affected

nchsoftware

  • ivm_attendant
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-434

Unrestricted Upload of File with Dangerous Type