Executive Summary
Summary | |
---|---|
Title | Freewill Solutions IFIS new trading web application vulnerable to unauthenticated remote code execution |
Informations | |||
---|---|---|---|
Name | VU#947701 | First vendor Publication | 2023-08-07 |
Vendor | VU-CERT | Last vendor Modification | 2023-08-07 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
OverviewFreewill Solutions IFIS new trading web application version 20.01.01.04 is vulnerable to unauthenticated remote code execution. Successful exploitation of this vulnerability allows an attacker to run arbitrary shell commands on the affected host. DescriptionFreewill Solutions IFIS new trading web application passes a user controlled variable directly to a shell_exec function call on a specific report page. To exploit the vulnerability, an attacker can add shell meta characters to the user controlled variable so that the application executes attacker specified commands. ImpactAn attacker with access to the applications web interface can execute code on the remote host. This level of access allows for complete compromise of the affected machine. SolutionThe CERT/CC is currently unaware of a practical solution to this problem. AcknowledgementsThanks to Sameer Mohite (Mandiant) for reporting the vulnerability. This document was written by Kevin Stephens. |
Original Source
Url : https://kb.cert.org/vuls/id/947701 |
Alert History
Date | Informations |
---|---|
2023-08-07 21:22:25 |
|