CVE-2022-29539

resi-calltrace in RESI Gemini-Net 4.2 is affected by OS Command Injection. It does not properly check the parameters sent as input before they are processed on the server. Due to the lack of validation of user input, an unauthenticated attacker can bypass the syntax intended by the software (e.g., concatenate `&|;\r\ commands) and inject arbitrary system commands with the privileges of the application user.
Configurations

Configuration 1 (hide)

cpe:2.3:a:resi:gemini-net:4.2:*:*:*:*:*:*:*

History

21 Nov 2024, 06:59

Type Values Removed Values Added
References () https://www.gruppotim.it/it/footer/red-team.html - Third Party Advisory () https://www.gruppotim.it/it/footer/red-team.html - Third Party Advisory
References () https://www.resi.it/prodotti-soluzioni-commerciali/gemini-network-service-monitoring - Product, Vendor Advisory () https://www.resi.it/prodotti-soluzioni-commerciali/gemini-network-service-monitoring - Product, Vendor Advisory

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-20 CWE-78

Information

Published : 2022-05-12 15:15

Updated : 2024-11-21 06:59


NVD link : CVE-2022-29539

Mitre link : CVE-2022-29539

CVE.ORG link : CVE-2022-29539


JSON object : View

Products Affected

resi

  • gemini-net
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')