Description
In GenieACS 1.2.x before 1.2.8, the UI interface API is vulnerable to unauthenticated OS command injection via the ping host argument (lib/ui/api.ts and lib/ping.ts). The vulnerability arises from insufficient input validation combined with a missing authorization check.
Recommendation
Update the genieacs package to the latest compatible version. Followings are version details:
- Affected version(s): < 1.2.8
- Patched version(s): 1.2.8
References
Related Issues
- react-dev-utils OS Command Injection in function `getProcessForPort` - CVE-2021-24033
- Command injection in launchpad - CVE-2021-23330
- Command Injection Vulnerability in systeminformation - CVE-2021-21388
- Command Injection Vulnerability - CVE-2021-21315
- Tags:
- npm
- genieacs
Anything's wrong? Let us know Last updated on February 03, 2023