cve/2024/CVE-2024-26260.md

18 lines
887 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2024-26260](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26260)
![](https://img.shields.io/static/v1?label=Product&message=OAKlouds&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%20%3C%20188%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brighgreen)
### Description
The functionality for synchronization in HGiga OAKlouds' certain moudules has an OS Command Injection vulnerability, allowing remote attackers to inject system commands within specific request parameters. This enables the execution of arbitrary code on the remote server without permission.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds