Description
Pandora FMS ≤ 7.42 suffers from a remote code execution vulnerability. To exploit the vulnerability, an authenticated user should create a new folder with a "tricky" name in the filemanager. The exploit works when the php-fileinfo extension is disabled on the host system. The attacker must include shell metacharacters in the content type.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-10606 | Pandora FMS ≤ 7.42 suffers from a remote code execution vulnerability. To exploit the vulnerability, an authenticated user should create a new folder with a "tricky" name in the filemanager. The exploit works when the php-fileinfo extension is disabled on the host system. The attacker must include shell metacharacters in the content type. |
References
| Link | Providers |
|---|---|
| https://k4m1ll0.com/cve-2019-20050.html |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T02:32:10.522Z
Reserved: 2019-12-27T00:00:00.000Z
Link: CVE-2019-20050
No data.
Status : Modified
Published: 2020-01-30T16:15:11.690
Modified: 2024-11-21T04:37:57.967
Link: CVE-2019-20050
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD