### [CVE-2018-19908](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19908) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description An issue was discovered in MISP 2.4.9x before 2.4.99. In app/Model/Event.php (the STIX 1 import code), an unescaped filename string is used to construct a shell command. This vulnerability can be abused by a malicious authenticated user to execute arbitrary commands by tweaking the original filename of the STIX import. ### POC #### Reference - https://www.exploit-db.com/exploits/46401/ - https://www.exploit-db.com/exploits/46401/ #### Github No PoCs found on GitHub currently.