ID |
CVE-2021-40222
|
Sažetak |
Rittal CMC PU III Web management Version affected: V3.11.00_2. Version fixed: V3.17.10 is affected by a remote code execution vulnerablity. It is possible to introduce shell code to create a reverse shell in the PU-Hostname field of the TCP/IP Configuration dialog. Web application fails to sanitize user input on Network TCP/IP configuration page. This allows the attacker to inject commands as root on the device which will be executed once the data is received. |
Reference |
|
CVSS |
Base: | 9.0 |
Impact: | 10.0 |
Exploitability: | 8.0 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
LOW |
SINGLE |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
COMPLETE |
COMPLETE |
COMPLETE |
|
CVSS vektor |
AV:N/AC:L/Au:S/C:C/I:C/A:C |
Zadnje važnije ažuriranje |
22-09-2021 - 13:23 |
Objavljeno |
09-09-2021 - 12:15 |