IntelMQ Manager from version 1.1.0 and before version 2.1.1 has a vulnerability where the backend incorrectly handled messages given by user-input in the "send" functionality of the Inspect-tool of the Monitor component. An attacker with access to the IntelMQ Manager could possibly use this issue to execute arbitrary code with the privileges of the webserver. Version 2.1.1 fixes the vulnerability.
References
Link | Resource |
---|---|
https://github.com/certtools/intelmq-manager/commit/b9a2ac43a4f99d764b827108f6a99dc4a9faa013 | Patch Third Party Advisory |
https://github.com/certtools/intelmq-manager/security/advisories/GHSA-rrhh-rcgp-q2m2 | Patch Third Party Advisory |
https://github.com/certtools/intelmq-manager/releases/tag/2.1.1 | Third Party Advisory |
https://lists.cert.at/pipermail/intelmq-users/2020-April/000161.html | Third Party Advisory |
Configurations
Information
Published : 2020-04-30 16:15
Updated : 2020-05-06 12:51
NVD link : CVE-2020-11016
Mitre link : CVE-2020-11016
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
intelmq_manager_project
- intelmq_manager