1 results (0.002 seconds)

CVSS: 10.0EPSS: 96%CPEs: 1EXPL: 5

Endian Firewall before 3.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) NEW_PASSWORD_1 or (2) NEW_PASSWORD_2 parameter to cgi-bin/chpasswd.cgi. Vulnerabilidad en Endian Firewall en versiones anteriores a 3.0, permite a atacantes remotos ejecutar comandos arbitrarios a través de metacaracteres en la shell en el parámetro (1) NEW_PASSWORD_1 o (2) NEW_PASSWORD_2 en cgi-bin/chpasswd.cgi. • https://www.exploit-db.com/exploits/37426 https://www.exploit-db.com/exploits/37428 https://www.exploit-db.com/exploits/38096 http://packetstormsecurity.com/files/133469/Endian-Firewall-Proxy-Password-Change-Command-Injection.html http://www.rapid7.com/db/modules/exploit/linux/http/efw_chpasswd_exec https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/efw_chpasswd_exec.rb • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •