vendor:
IBM Aspera Faspex
by:
Maurice Lambert
7.5
CVSS
HIGH
YAML deserialization
CWE
Product Name: IBM Aspera Faspex
Affected Version From: 4.4.2001
Affected Version To: 4.4.2001
Patch Exists: No
Related CWE: CVE-2022-47986
CPE:
Tags: cve,cve2022,ibm,aspera,faspex,kev,packetstorm
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://blog.assetnote.io/2023/02/02/pre-auth-rce-aspera-faspex/, https://www.ibm.com/support/pages/node/6952319, https://exchange.xforce.ibmcloud.com/vulnerabilities/243512, http://packetstormsecurity.com/files/171772/IBM-Aspera-Faspex-4.4.1-YAML-Deserialization.html, https://nvd.nist.gov/vuln/detail/CVE-2022-47986
Nuclei Metadata: {'max-request': 1, 'shodan-query': 'html:"Aspera Faspex"', 'verified': True, 'vendor': 'ibm', 'product': 'aspera_faspex'}
Platforms Tested: Linux
2023
IBM Aspera Faspex 4.4.1 – YAML deserialization (RCE)
This file implements a POC for CVE-2022-47986 an YAML deserialization that causes a RCE in IBM Aspera Faspex (before 4.4.2).
Mitigation:
Upgrade to version 4.4.2 or above.