A command injection vulnerability has been discovered in the bootstrap stage of Bitdefender BOX 2, versions 2.1.47.42 and 2.1.53.45. The API method `/api/download_image` unsafely handles the production firmware URL supplied by remote servers, leading to arbitrary execution of system commands. In order to exploit the condition, an unauthenticated attacker should impersonate a infrastructure server to trigger this vulnerability.
Advisories
Source ID Title
EUVD EUVD EUVD-2019-7562 A command injection vulnerability has been discovered in the bootstrap stage of Bitdefender BOX 2, versions 2.1.47.42 and 2.1.53.45. The API method `/api/download_image` unsafely handles the production firmware URL supplied by remote servers, leading to arbitrary execution of system commands. In order to exploit the condition, an unauthenticated attacker should impersonate a infrastructure server to trigger this vulnerability.
Fixes

Solution

An update that mitigates the issue has been delivered in: Bitdefender Central Android App version 2.0.66.88 Bitdefender Central iOS App version 2.0.66


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Bitdefender

Published:

Updated: 2024-09-17T01:36:07.424Z

Reserved: 2019-10-02T00:00:00

Link: CVE-2019-17095

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-01-27T18:15:12.493

Modified: 2024-11-21T04:31:40.967

Link: CVE-2019-17095

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses