Vulnerability CVE-2018-19908


Published: 2018-12-06

Description:
An issue was discovered in MISP 2.4.9x before 2.4.99. In app/Model/Event.php (the STIX 1 import code), an unescaped filename string is used to construct a shell command. This vulnerability can be abused by a malicious authenticated user to execute arbitrary commands by tweaking the original filename of the STIX import.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
MISP 2.4.97 SQL Injection / Command Injection
Tm9jdGlz
19.02.2019

Type:

CWE-78

(Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') )

CVSS2 => (AV:N/AC:L/Au:S/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
9/10
10/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
MISP -> MISP 

 References:
https://github.com/MISP/MISP/commit/211ac0737281b65e7da160f0aac52f401a94e1a3
https://github.com/MISP/MISP/releases/tag/v2.4.99
https://www.exploit-db.com/exploits/46401/

Copyright 2024, cxsecurity.com

 

Back to Top