cve/2019/CVE-2019-11642.md

19 lines
928 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-11642](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11642)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A log poisoning vulnerability has been discovered in the OneShield Policy (Dragon Core) framework before 5.1.10. Authenticated remote adversaries can poison log files by entering malicious payloads in either headers or form elements. These payloads are then executed via a client side debugging console. This is predicated on the debugging console and Java Bean being made available to the deployed application.
### POC
#### Reference
- http://seclists.org/fulldisclosure/2019/May/1
2024-06-09 00:33:16 +00:00
- http://seclists.org/fulldisclosure/2019/May/1
2024-05-26 14:27:05 +02:00
#### Github
No PoCs found on GitHub currently.