Summary
innoEDIT 6.2 suffer from a code execution vulnerability.
Impact
Successful exploits will allow remote attackers to execute arbitrary commands within the context of the application.
Solution
Ask the vendor for an update.
Affected
innoEDIT 6.2
Detection
Try to execute a command on the remote Host by sending some special crafted HTTP requests.
References
Updated on 2015-03-25
Severity
Classification
-
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- ALCASAR Remote Code Execution Vulnerability
- b2Evolution title SQL Injection
- AlienVault OSSIM Multiple Remote Code Execution Vulnerabilities
- Andy's PHP Knowledgebase 's' Parameter SQL Injection Vulnerability
- Apache Tomcat/JBoss EJBInvokerServlet / JMXInvokerServlet (RMI over HTTP) Marshalled Object Remote Code Execution