vendor:
IPCop
by:
Mücahit Saratar
9,8
CVSS
HIGH
Remote Code Execution (RCE)
78
CWE
Product Name: IPCop
Affected Version From: 2.1.8
Affected Version To: 2.1.9
Patch Exists: YES
Related CWE: N/A
CPE: a:ipcop:ipcop
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Parrot OS 5.7.0-2parrot2-amd64
2021
IPCop 2.1.9 – Remote Code Execution (RCE) (Authenticated)
This exploit allows an authenticated user to execute arbitrary code on the IPCop 2.1.9 system. The exploit works by sending a malicious POST request to the email.cgi script, which is used to configure the email settings. The malicious payload is sent in the EMAIL_PW parameter, which is then executed by the system. The exploit requires the attacker to have valid credentials for the system.
Mitigation:
The best way to mitigate this vulnerability is to ensure that all users have strong passwords and that the system is kept up to date with the latest security patches.