Users should upgrade to at least v0.25.5 to avoid this vulnerability.īWA DiREX-Pro 1.2181 devices allow remote attackers to execute arbitrary OS commands via shell metacharacters in the PKG parameter to uninstall.php3. The issue was addressed in a series of patches in versions 0.25.3, 0.25.4 and 0.25.5. This most impacts scenarios where non-trusted users are given permission to upload images in any area of the application. They would then have the permissions of the PHP process. Unmarshalling untrusted data can lead to security flaws of RCE.īookStack before version 0.25.5 has a vulnerability where a user could upload PHP files through image upload functions, which would allow them to execute code on the host system remotely. SnakeYAML allows to unmarshal data to a Java type By using the YAML tag. In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere's web console uses the SnakeYAML library for parsing YAML inputs to load datasource configuration. Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis. Patch information is provided when available. This information may include identifying information, values, definitions, and related links.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |