Description
An issue was discovered in MISP 2.4.9x before 2.4.99. In app/Model/Event.php (the STIX 1 import code), an unescaped filename string is used to construct a shell command. This vulnerability can be abused by a malicious authenticated user to execute arbitrary commands by tweaking the original filename of the STIX import.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T11:51:17.746Z
Reserved: 2018-12-06T00:00:00.000Z
Link: CVE-2018-19908
No data.
Status : Modified
Published: 2018-12-06T16:29:00.290
Modified: 2024-11-21T03:58:47.737
Link: CVE-2018-19908
No data.
OpenCVE Enrichment
No data.
Weaknesses