Summary
innoEDIT 6.2 suffer from a code execution vulnerability.
Impact
Successful exploits will allow remote attackers to execute arbitrary commands within the context of the application.
Solution
Ask the vendor for an update.
Affected
innoEDIT 6.2
Detection
Try to execute a command on the remote Host by sending some special crafted HTTP requests.
References
Updated on 2015-03-25
Severity
Classification
-
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Andy's PHP Knowledgebase 'step5.php' Remote PHP Code Execution Vulnerability
- Apache Axis2 Document Type Declaration Processing Security Vulnerability
- ArticleSetup Multiple Cross-Site Scripting and SQL Injection Vulnerabilities
- 3Com OfficeConnect VPN Firewall Default Password Security Bypass Vulnerability
- ASUS RT56U Router Multiple Vulnerabilities