An issue was discovered on Alcatel-Lucent OmniVista 4760 devices. A remote unauthenticated attacker can chain a directory traversal (which helps to bypass authentication) with an insecure file upload to achieve Remote Code Execution as SYSTEM. The directory traversal is in the __construct() whereas the insecure file upload is in SetSkinImages().
References
Link | Resource |
---|---|
https://git.lsd.cat/g/omnivista-rce | Exploit Third Party Advisory |
https://packetstormsecurity.com/files/155595/Alcatel-Lucent-Omnivista-8770-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://www.al-enterprise.com/en/-/media/assets/internet/documents/sa-c0065-ov8770-rce-vulnerability-en.pdf | Vendor Advisory |
https://www.exploit-db.com/exploits/47761 | Exploit Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2019-12-27 19:15
Updated : 2024-02-04 20:39
NVD link : CVE-2019-20049
Mitre link : CVE-2019-20049
CVE.ORG link : CVE-2019-20049
JSON object : View
Products Affected
al-enterprise
- omnivista_4760
CWE