vendor:
IMPACT/FIRST/PULSE/Eco v2.x
by:
LiquidWorm
7.8
CVSS
HIGH
OS command injection
78
CWE
Product Name: IMPACT/FIRST/PULSE/Eco v2.x
Affected Version From: Impact/Pulse/First (Version 2: 1.1/2.15)
Affected Version To: WM2 (Kantar Media) 1.11
Patch Exists: YES
Related CWE: CVE-2020-12345
CPE: cpe:a:sound4:impact/pulse/first
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=148894, https://www.infosecmatter.com/nessus-plugin-library/?id=106846, https://www.infosecmatter.com/metasploit-module-library/?mm=auxiliary/dos/hp/data_protector_rds, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/tftp/attftp_long_filename, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/misc/nettransport, https://www.infosecmatter.com/metasploit-module-library/?mm=auxiliary/dos/http/apache_range_dos, https://www.infosecmatter.com/nessus-plugin-library/?id=94365, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/multi/http/vbseo_proc_deutf, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/multi/misc/ibm_tm1_unauth_rce, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/linux/misc/quest_pmmasterd_bof
Platforms Tested: Windows, Linux, Mac
2020
SOUND4 IMPACT/FIRST/PULSE/Eco v2.x – Remote Command Execution (RCE)
The application suffers from an unauthenticated OS command injection vulnerability. This can be exploited to inject and execute arbitrary shell commands through the 'password' HTTP POST parameter through index.php.
Mitigation:
Upgrade to the latest version of the application.