cve/2024/CVE-2024-1367.md

18 lines
848 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2024-1367](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1367)
![](https://img.shields.io/static/v1?label=Product&message=Security%20Center&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brighgreen)
### Description
A command injection vulnerability exists where an authenticated, remote attacker with administrator privileges on the Security Center application could modify Logging parameters, which could lead to the execution of arbitrary code on the Security Center host.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds