Executive Summary

Informations
NameCVE-2019-9161First vendor Publication2019-04-18
VendorCveLast vendor Modification2019-04-19

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score10Attack RangeNetwork
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

WAC on the Sangfor Sundray WLAN Controller version 3.7.4.2 and earlier has a Remote Code Execution issue allowing remote attackers to achieve full access to the system, because shell metacharacters in the nginx_webconsole.php Cookie header can be used to read an etc/config/wac/wns_cfg_admin_detail.xml file containing the admin password. (The password for root is the WebUI admin password concatenated with a static string.)

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9161

CWE : Common Weakness Enumeration

%idName
100 %CWE-77Improper Sanitization of Special Elements used in a Command ('Command Injection')

CPE : Common Platform Enumeration

TypeDescriptionCount
Hardware1
Os1

Sources (Detail)

SourceUrl
MISC http://www.cnvd.org.cn/flaw/show/CNVD-2019-07679

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2019-04-20 00:19:15
  • Multiple Updates
2019-04-19 05:18:11
  • First insertion