The Admin web application in Kinetica 7.0.9.2.20191118151947 does not properly sanitise the input for the function getLogs. This lack of sanitisation could be exploited to allow an authenticated attacker to run remote code on the underlying operating system. The logFile parameter in the getLogs function was used as a variable in a command to read log files; however, due to poor input sanitisation, it was possible to bypass a replacement and break out of the command.
References
Link | Resource |
---|---|
https://support.kinetica.com/hc/en-us/categories/360001223653-Release-Notes | Release Notes Vendor Advisory |
https://www.nccgroup.trust/uk/our-research/technical-advisory-command-injection/?research=Technical+advisories | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-02-11T17:15:42
Updated: 2020-02-11T17:15:42
Reserved: 2020-01-29T00:00:00
Link: CVE-2020-8429
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-02-11T18:15:17.947
Modified: 2021-07-21T11:39:23.747
Link: CVE-2020-8429
JSON object: View
Redhat Information
No data.
CWE