vendor:
Openfiler
by:
Dolev Farhi
9,3
CVSS
HIGH
Arbitrary Code Execution
78
CWE
Product Name: Openfiler
Affected Version From: 2.99.1
Affected Version To: 2.99.1
Patch Exists: YES
Related CWE: N/A
CPE: a:openfiler:openfiler
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2014
Arbitrary Code Execution in Openfiler
Openfiler is a network storage operating system. With the features we built into Openfiler, you can take advantage of file-based Network Attached Storage and block-based Storage Area Networking functionality in a single cohesive framework. An arbitrary code execution vulnerability exists in Openfiler, which allows an attacker to execute arbitrary code on the vulnerable system. This is achieved by logging into the Openfiler dashboard, navigating to the system tab, and entering a shell command using the backticks ` `. The code will then be reflected in the hostname value space.
Mitigation:
The vendor has released a patch to address this vulnerability. Users should update to the latest version of Openfiler.