Description
In GenieACS 1.2.x before 1.2.8, the UI interface API is vulnerable to unauthenticated OS command injection via the ping host argument (lib/ui/api.ts and lib/ping.ts). The vulnerability arises from insufficient input validation combined with a missing authorization check.
Recommendation
Update the genieacs package to the latest compatible version. Followings are version details:
- Affected version(s): < 1.2.8
- Patched version(s): 1.2.8
References
Related Issues
- Command Injection in lodash (GHSA-35jh-r3h4-6jhm) - CVE-2021-23337
- Command injection in google-it - CVE-2021-34083
- Command Injection Vulnerability - CVE-2021-21315
- json-logic-js Command Injection vulnerability - CVE-2021-4329
- Tags:
- npm
- genieacs
Anything's wrong? Let us know Last updated on February 03, 2023