Description
In GenieACS 1.2.x before 1.2.8, the UI interface API is vulnerable to unauthenticated OS command injection via the ping host argument (lib/ui/api.ts and lib/ping.ts). The vulnerability arises from insufficient input validation combined with a missing authorization check.
Remediation
References
https://github.com/genieacs/genieacs/commit/7f295beeecc1c1f14308a93c82413bb334045af6
https://github.com/genieacs/genieacs/releases/tag/v1.2.8
Related Vulnerabilities
CVE-2023-36478 Vulnerability in maven package org.eclipse.jetty.http2:http2-hpack
CVE-2022-39299 Vulnerability in npm package @node-saml/passport-saml
CVE-2023-26477 Vulnerability in maven package org.xwiki.platform:xwiki-platform-flamingo-theme-ui
CVE-2022-25858 Vulnerability in maven package org.webjars.npm:terser
CVE-2023-43642 Vulnerability in maven package org.xerial.snappy:snappy-java