cve/2022/CVE-2022-40282.md

19 lines
882 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-40282](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40282)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The web server of Hirschmann BAT-C2 before 09.13.01.00R04 allows authenticated command injection. This allows an authenticated attacker to pass commands to the shell of the system because the dir parameter of the FsCreateDir Ajax function is not sufficiently sanitized. The vendor's ID is BSECV-2022-21.
### POC
#### Reference
- http://packetstormsecurity.com/files/170063/Hirschmann-Belden-BAT-C2-8.8.1.0R8-Command-Injection.html
- http://seclists.org/fulldisclosure/2022/Nov/19
#### Github
- https://github.com/ARPSyndicate/cvemon