LPAR2RRD in 3.5 and earlier allows remote attackers to execute arbitrary commands due to insufficient input sanitization of the web GUI parameters.
References
Link | Resource |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/94784 | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/127593/LPAR2RRD-3.5-4.53-Command-Injection.html | Third Party Advisory VDB Entry |
http://ocert.org/advisories/ocert-2014-005.html | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2014/07/23/6 | Mailing List Third Party Advisory |
http://www.lpar2rrd.com/note453-01.htm | Vendor Advisory |
http://www.securityfocus.com/bid/68844 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2020-02-17 14:15
Updated : 2020-02-20 08:15
NVD link : CVE-2014-4981
Mitre link : CVE-2014-4981
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
xorux
- lpar2rrd