Description
In GenieACS 1.2.x before 1.2.8, the UI interface API is vulnerable to unauthenticated OS command injection via the ping host argument (lib/ui/api.ts and lib/ping.ts). The vulnerability arises from insufficient input validation combined with a missing authorization check.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-2877-693q-pj33 | OS Command Injection in GenieACS |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T05:17:41.630Z
Reserved: 2022-03-06T00:00:00.000Z
Link: CVE-2021-46704
No data.
Status : Modified
Published: 2022-03-06T07:15:07.200
Modified: 2024-11-21T06:34:36.267
Link: CVE-2021-46704
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA