vendor:
Tealeaf CX
by:
drone
7,5
CVSS
HIGH
Remote OS Command Injection
78, 94
CWE
Product Name: Tealeaf CX
Affected Version From: Version 8 Release 8
Affected Version To: Version 8 Release 8
Patch Exists: YES
Related CWE: CVE-2013-6719, CVE-2013-6720
CPE: a:ibm:tealeaf_cx:8.8
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Redhat Linux 6.2
2013
IBM Tealeaf CX (v8 release 8) Remote OS Command Injection
This exploit allows an attacker to execute arbitrary OS commands on IBM Tealeaf CX (v8 release 8) without authentication. The exploit is triggered by sending a specially crafted POST request to the delivery.php page. The POST request contains a parameter called 'testconn_host' which is used to execute the arbitrary OS command. The exploit also allows an attacker to access the /download.php?log=../../etc/passwd page, which can be used to gain access to the system's password file.
Mitigation:
IBM has released a patch to address this vulnerability. Users should upgrade to the latest version of IBM Tealeaf CX (v8 release 8).