vendor:
File Transfer Appliance
by:
hdm
N/A
CVSS
N/A
Metacharacter Shell Injection
78
CWE
Product Name: File Transfer Appliance
Affected Version From: FTA_9_11_200
Affected Version To: FTA_9_11_210
Patch Exists: YES
Related CWE: 2015-2857
CPE: a:accellion:file_transfer_appliance
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Unix
2015
Accellion FTA getStatus verify_oauth_token Command Execution
This module exploits a metacharacter shell injection vulnerability in the Accellion File Transfer appliance. This vulnerability is triggered when a user-provided 'oauth_token' is passed into a system() call within a mod_perl handler. This module exploits the '/tws/getStatus' endpoint. Other vulnerable handlers include '/seos/find.api', '/seos/put.api', and /seos/mput.api'. This issue was confirmed on version FTA_9_11_200, but may apply to previous versions as well. This issue was fixed in software update FTA_9_11_210.
Mitigation:
Software update FTA_9_11_210