Description
Acunetix determined that the IBM Aspera Faspex is vulnerable to remote code execution due to insecure YAML deserialization. An attacker could exploit this vulnerability using specially-crafted serialized data to execute arbitrary code on the system or to perform a denial of service attack.
Remediation
Upgrade to the latest version of IBM Aspera Faspex
References
Security Bulletin: IBM Aspera Faspex 4.4.2 PL2 has addressed multiple vulnerabilities
Pre-Auth RCE in Aspera Faspex: Case Guide for Auditing Ruby on Rails