OCS Inventory 2.4.1 is prone to a remote command-execution vulnerability. Specifically, this issue occurs because the content of the ipdiscover_analyser rzo GET parameter is concatenated to a string used in an exec() call in the PHP code. Authentication is needed in order to exploit this vulnerability.
References
Link | Resource |
---|---|
https://www.tarlogic.com/en/blog/vulnerabilities-in-ocs-inventory-2-4-1/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-08-03T16:00:00
Updated: 2018-08-03T15:57:01
Reserved: 2018-06-15T00:00:00
Link: CVE-2018-12483
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-08-04T01:29:02.810
Modified: 2018-10-02T19:55:05.823
Link: CVE-2018-12483
JSON object: View
Redhat Information
No data.
CWE