A OS Command Injection vulnerability in the bootstrap stage of Bitdefender BOX 2 allows the manipulation of the `get_image_url()` function in special circumstances to inject a system command.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-7563 | A OS Command Injection vulnerability in the bootstrap stage of Bitdefender BOX 2 allows the manipulation of the `get_image_url()` function in special circumstances to inject a system command. |
Fixes
Solution
An update that mitigates the issue has been delivered in: Bitdefender Central Android App version 2.0.66.88 Bitdefender Central iOS App version 2.0.66
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Bitdefender
Published:
Updated: 2024-09-17T02:22:08.732Z
Reserved: 2019-10-02T00:00:00
Link: CVE-2019-17096
No data.
Status : Modified
Published: 2020-01-27T17:15:12.073
Modified: 2024-11-21T04:31:41.107
Link: CVE-2019-17096
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD