OS Command Injection in GenieACS
Critical severity
GitHub Reviewed
Published
Mar 7, 2022
to the GitHub Advisory Database
•
Updated Feb 3, 2023
Description
Published by the National Vulnerability Database
Mar 6, 2022
Published to the GitHub Advisory Database
Mar 7, 2022
Reviewed
Mar 7, 2022
Last updated
Feb 3, 2023
In GenieACS 1.2.x before 1.2.8, the UI interface API is vulnerable to unauthenticated OS command injection via the ping host argument (lib/ui/api.ts and lib/ping.ts). The vulnerability arises from insufficient input validation combined with a missing authorization check.
References