vendor:
UVC
by:
Anonymous
9,8
CVSS
HIGH
Remote Code Execution (RCE)
78
CWE
Product Name: UVC
Affected Version From: 1.2.6
Affected Version To: 1.2.6
Patch Exists: YES
Related CWE: N/A
CPE: a:lifesize:uvc:1.2.6
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2020
LifeSize UVC 1.2.6 authenticated vulnerabilities
An authenticated user can execute arbitrary code on the LifeSize UVC 1.2.6 system by sending a specially crafted POST request to the server-admin/operations/diagnose/ping/, server-admin/operations/diagnose/trace/ and server-admin/operations/diagnose/dns/ endpoints. The POST request contains a malicious source_ip parameter which contains a command to be executed on the server. The command is executed as the www-data user.
Mitigation:
Upgrade to the latest version of LifeSize UVC 1.2.6 or later.