// For flags

CVE-2019-10863

TeemIp IPAM < 2.4.0 - 'new_config' Command Injection

Severity Score

7.2
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A command injection vulnerability exists in TeemIp versions before 2.4.0. The new_config parameter of exec.php allows one to create a new PHP file with the exception of config information. The malicious PHP code sent is executed instantaneously and is not saved on the server.

Existe una vulnerabilidad de inyección de comandos en versiones de Teemlp anteriores a la 2.4.0. El nuevo parámetro config de exec.php permite la creación de un nuevo archivo PHP con la excepción de la información de configuración. El código PHP malicioso enviado se ejecuta instantáneamente y no se guarda en el servidor.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-04-04 CVE Reserved
  • 2019-04-04 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • 2024-08-25 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Combodo
Search vendor "Combodo"
Teemip
Search vendor "Combodo" for product "Teemip"
< 2.4.0
Search vendor "Combodo" for product "Teemip" and version " < 2.4.0"
-
Affected