Code Injection in EMC Data Protection Advisor - CVE-2019-18582

 

Code Injection in EMC Data Protection Advisor - CVE-2019-18582

Published: March 18, 2020 / Updated: August 8, 2020


Vulnerability identifier: #VU34727
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2019-18582
CWE-ID: CWE-94
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Dell
Affected software:
EMC Data Protection Advisor

Detailed vulnerability description

The vulnerability allows a remote privileged user to execute arbitrary code.

Dell EMC Data Protection Advisor versions 6.3, 6.4, 6.5, 18.2 versions prior to patch 83, and 19.1 versions prior to patch 71 contain a server-side template injection vulnerability in the REST API. A remote authenticated malicious user with administrative privileges may potentially exploit this vulnerability to inject malicious report generation scripts in the server. This may lead to OS command execution as the regular user runs the DPA service on the affected system.


How to mitigate CVE-2019-18582

Install update from vendor's website.

Sources