The '/common/ajax_email_connection_test.php' script in the Quest KACE System Management Appliance 8.0.318 is accessible by any authenticated user and can be abused to execute arbitrary commands on the system. This script is vulnerable to command injection via the unsanitized user input 'TEST_SERVER' sent to the script via the POST method.
References
Link | Resource |
---|---|
https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities | Exploit Technical Description Third Party Advisory |
Configurations
Information
Published : 2018-05-31 11:29
Updated : 2019-10-02 17:03
NVD link : CVE-2018-11139
Mitre link : CVE-2018-11139
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
quest
- kace_system_management_appliance