Radisys MRF Web Panel の /swms/ms.cgi における OS コマンドインジェクションの脆弱性
| Title |
Radisys MRF Web Panel の /swms/ms.cgi における OS コマンドインジェクションの脆弱性
|
| Summary |
Radisys MRF Web Panel (SWMS) の /swms/ms.cgi には、OS コマンドインジェクションの脆弱性が存在します。
|
| Possible impacts |
MSM_MACRO_NAME POST パラメータを介して、OS コマンドを挿入される可能性があります。 |
| Solution |
ベンダ情報および参考情報を参照して適切な対策を実施してください。 |
| Publication Date |
Dec. 26, 2016, midnight |
| Registration Date |
April 4, 2017, 4:16 p.m. |
| Last Update |
April 4, 2017, 4:16 p.m. |
|
CVSS3.0 : 緊急
|
| Score |
10
|
| Vector |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
|
CVSS2.0 : 危険
|
| Score |
10
|
| Vector |
AV:N/AC:L/Au:N/C:C/I:C/A:C |
Affected System
| Radisys |
|
MRF Web Panel 9.0.1
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
| No |
Changed Details |
Date of change |
| 0 |
[2017年04月04日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
NVD Vulnerability Information
CVE-2016-10043
| Summary |
An issue was discovered in Radisys MRF Web Panel (SWMS) 9.0.1. The MSM_MACRO_NAME POST parameter in /swms/ms.cgi was discovered to be vulnerable to OS command injection attacks. It is possible to use the pipe character (|) to inject arbitrary OS commands and retrieve the output in the application's responses. Attackers could execute unauthorized commands, which could then be used to disable the software, or read, write, and modify data for which the attacker does not have permissions to access directly. Since the targeted application is directly executing the commands instead of the attacker, any malicious activities may appear to come from the application or the application's owner (apache user).
|
| Publication Date |
Feb. 1, 2017, 3:59 a.m. |
| Registration Date |
Jan. 26, 2021, 2:04 p.m. |
| Last Update |
Nov. 21, 2024, 11:43 a.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:mrf:web_panel:9.0.1:*:*:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List