An issue was discovered in MISP 2.4.9x before 2.4.99. In app/Model/Event.php (the STIX 1 import code), an unescaped filename string is used to construct a shell command. This vulnerability can be abused by a malicious authenticated user to execute arbitrary commands by tweaking the original filename of the STIX import.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2018-12-06T16:00:00
Updated: 2024-08-05T11:51:17.746Z
Reserved: 2018-12-06T00:00:00
Link: CVE-2018-19908
Vulnrichment
No data.
NVD
Status : Modified
Published: 2018-12-06T16:29:00.290
Modified: 2024-11-21T03:58:47.737
Link: CVE-2018-19908
Redhat
No data.