Description
An exploitable command injection vulnerability exists in the Config editor of the Exhibitor Web UI versions 1.0.9 to 1.7.1. Arbitrary shell commands surrounded by backticks or $() can be inserted into the editor and will be executed by the Exhibitor process when it launches ZooKeeper. An attacker can execute any command as the user running the Exhibitor process.
Published: 2019-11-13
Score: 9.8 Critical
EPSS: 85.2% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

Exhibitor Project Exhibitor
cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2024-08-04T19:40:49.119Z

Reserved: 2019-01-04T00:00:00.000Z

Link: CVE-2019-5029

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-11-13T23:15:12.153

Modified: 2024-11-21T04:44:12.707

Link: CVE-2019-5029

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses