cve/2019/CVE-2019-7195.md

25 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-7195](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7195)
![](https://img.shields.io/static/v1?label=Product&message=QNAP%20NAS%20devices%20running%20Photo%20Station&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=External%20Control%20of%20File%20Name%20or%20Path&color=brighgreen)
### Description
This external control of file name or path vulnerability allows remote attackers to access or modify system files. To fix the vulnerability, QNAP recommend updating Photo Station to their latest versions.
### POC
#### Reference
- http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/cycraft-corp/cve-2019-7192-check
- https://github.com/lnick2023/nicenice
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/th3gundy/CVE-2019-7192_QNAP_Exploit
- https://github.com/xbl3/awesome-cve-poc_qazbnm456