Wazuh API in Wazuh from 4.0.0 to 4.0.3 allows authenticated users to execute arbitrary code with administrative privileges via /manager/files URI. An authenticated user to the service may exploit incomplete input validation on the /manager/files API to inject arbitrary code within the API service script.
References
Link Resource
https://documentation.wazuh.com/4.0/release-notes/release_4_0_4.html Release Notes Vendor Advisory
https://github.com/wazuh/wazuh/releases/tag/v4.0.4 Release Notes Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2021-03-06T01:24:12

Updated: 2021-03-06T01:24:12

Reserved: 2021-02-05T00:00:00


Link: CVE-2021-26814

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2021-03-06T02:15:12.100

Modified: 2022-07-12T17:42:04.277


Link: CVE-2021-26814

JSON object: View

cve-icon Redhat Information

No data.

CWE