The Admin web application in Kinetica 7.0.9.2.20191118151947 does not properly sanitise the input for the function getLogs. This lack of sanitisation could be exploited to allow an authenticated attacker to run remote code on the underlying operating system. The logFile parameter in the getLogs function was used as a variable in a command to read log files; however, due to poor input sanitisation, it was possible to bypass a replacement and break out of the command.
References
Link | Resource |
---|---|
https://support.kinetica.com/hc/en-us/categories/360001223653-Release-Notes | Release Notes Vendor Advisory |
https://www.nccgroup.trust/uk/our-research/technical-advisory-command-injection/?research=Technical+advisories | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2020-02-11 18:15
Updated : 2024-02-04 20:39
NVD link : CVE-2020-8429
Mitre link : CVE-2020-8429
CVE.ORG link : CVE-2020-8429
JSON object : View
Products Affected
kinetica
- kinetica
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')