vendor:
NitroView ESM
by:
N/A
N/A
CVSS
N/A
Remote Code Execution
78
CWE
Product Name: NitroView ESM
Affected Version From: 8.4.0a
Affected Version To: 8.4.0a
Patch Exists: YES
Related CWE: N/A
CPE: NitroSecurity 2.6.22.19-24nssmp64 GNU/Linux
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: GNU/Linux
2010
Remote Code Execution Vulnerability in NitroView ESM
During research it was found that perl module "ess.pm" is prone to remote code execution vulnerability due to lack of user input validation. Because of the "system()" call in "ess.pm" module it's possible to send specially crafted request to NitroSecurity ESM web interface, which results in remote command execution. It's necessery to change IFS (Internal Field Separator) to exploit this vulnerability. Probably other methods also would work.
Mitigation:
Patch released by the vendor