vendor:
OmniPCX Office
by:
Digital Security Research Group [DSecRG]
7.31
CVSS
HIGH
Remote command execution
78
CWE
Product Name: OmniPCX Office
Affected Version From: Alcatel OmniPCX Office since release 210/061.1
Affected Version To: Alcatel OmniPCX Office since release 210/061.1
Patch Exists: YES
Related CWE: 2008-1331
CPE: a:alcatel:omnipcx_office
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2008
DSECRG-08-020
The risk of this vulnerability is high. Any user which has access to the web interface of the OmniPCX Enterprise solution will be able to execute arbitrary commands on the server with the permissions of the webserver. Remote command execution vulnerability found in script /cgi-data/FastJSData.cgi in parameter name id2 Variable id2 not being filtered when passed to the shell. Thus, arbitrary commands can be executed on the server by adding them to the user variable, separated by semicolons.
Mitigation:
You can find more details on this advisory on vendors website http://www1.alcatel-lucent.com/psirt/statements.htm under reference number ALU-2008-1331