cgi-data/FastJSData.cgi in OmniPCX Office with Internet Access services OXO210 before 210/091.001, OXO600 before 610/014.001, and other versions, allows remote attackers to execute arbitrary commands and "obtain OXO resources" via shell metacharacters in the id2 parameter.
References
Link | Resource |
---|---|
http://secunia.com/advisories/29798 | Third Party Advisory |
http://www.securityfocus.com/archive/1/492383/100/0/threaded | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/28758 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id?1020082 | Third Party Advisory VDB Entry |
http://www.vupen.com/english/advisories/2008/1057 | Permissions Required |
http://www1.alcatel-lucent.com/psirt/statements/2008001/OXOrexec.htm | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41560 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/5662 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2008-04-02 20:44
Updated : 2024-02-04 17:33
NVD link : CVE-2008-1331
Mitre link : CVE-2008-1331
CVE.ORG link : CVE-2008-1331
JSON object : View
Products Affected
alcatel-lucent
- omnipcx_office
CWE
CWE-20
Improper Input Validation