Description
In GenieACS 1.2.x before 1.2.8, the UI interface API is vulnerable to unauthenticated OS command injection via the ping host argument (lib/ui/api.ts and lib/ping.ts). The vulnerability arises from insufficient input validation combined with a missing authorization check.
Remediation
References
https://github.com/genieacs/genieacs/commit/7f295beeecc1c1f14308a93c82413bb334045af6
https://github.com/genieacs/genieacs/releases/tag/v1.2.8
Related Vulnerabilities
CVE-2020-28458 Vulnerability in maven package org.webjars.bower:datatables.net
CVE-2021-27884 Vulnerability in npm package yapi-vendor
CVE-2023-1428 Vulnerability in maven package io.grpc:grpc-protobuf
CVE-2022-26049 Vulnerability in maven package com.diffplug.gradle:goomph
CVE-2020-10693 Vulnerability in maven package org.hibernate:hibernate-validator