An issue was discovered on Alcatel-Lucent OmniVista 4760 devices. A remote unauthenticated attacker can chain a directory traversal (which helps to bypass authentication) with an insecure file upload to achieve Remote Code Execution as SYSTEM. The directory traversal is in the __construct() whereas the insecure file upload is in SetSkinImages().
References
Link | Resource |
---|---|
https://git.lsd.cat/g/omnivista-rce | Exploit Third Party Advisory |
https://packetstormsecurity.com/files/155595/Alcatel-Lucent-Omnivista-8770-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://www.al-enterprise.com/en/-/media/assets/internet/documents/sa-c0065-ov8770-rce-vulnerability-en.pdf | Vendor Advisory |
https://www.exploit-db.com/exploits/47761 | Exploit Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-12-27T18:18:22
Updated: 2019-12-27T18:18:22
Reserved: 2019-12-27T00:00:00
Link: CVE-2019-20049
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-12-27T19:15:12.723
Modified: 2020-01-07T20:39:24.537
Link: CVE-2019-20049
JSON object: View
Redhat Information
No data.
CWE