Vulnerabilities/

OS Command Injection in GenieACS

Severity:
High

Description

In GenieACS 1.2.x before 1.2.8, the UI interface API is vulnerable to unauthenticated OS command injection via the ping host argument (lib/ui/api.ts and lib/ping.ts). The vulnerability arises from insufficient input validation combined with a missing authorization check.

Recommendation

Update the genieacs package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
genieacs
Anything's wrong? Let us know Last updated on February 03, 2023

This issue is available in SmartScanner Professional

See Pricing