vendor:
WePresent
by:
Jacob Baines
9.8
CVSS
CRITICAL
Command Injection
78
CWE
Product Name: WePresent
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: YES
Related CWE: CVE-2019-3929
CPE: a:barco:wepresent
Tags: tenable,cve,cve2019,oast,injection,kev,edb,rce,packetstorm
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
http://packetstormsecurity.com/files/152715/Barco-AWIND-OEM-Presentation-Platform-Unauthenticated-Remote-Command-Injection.html, https://www.exploit-db.com/exploits/46786/, https://nvd.nist.gov/vuln/detail/CVE-2019-3929, https://www.tenable.com/security/research/tra-2019-20, http://packetstormsecurity.com/files/155948/Barco-WePresent-file_transfer.cgi-Command-Injection.html
Nuclei Metadata: {'max-request': 1, 'vendor': 'crestron', 'product': 'am-100_firmware'}
Platforms Tested: Unix, Linux
2019
Barco WePresent file_transfer.cgi Command Injection
This module exploits an unauthenticated remote command injection vulnerability found in Barco WePresent and related OEM'ed products. The vulnerability is triggered via an HTTP POST request to the file_transfer.cgi endpoint.
Mitigation:
Apply the latest security patches and updates for the affected software.