#VU6897 Command injection in dnaLIMS - CVE-2017-6526
Published: June 2, 2017 / Updated: September 14, 2018
Vulnerability identifier: #VU6897
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber
CVE-ID: CVE-2017-6526
CWE-ID: CWE-77
Exploitation vector: Remote access
Exploit availability:
Public exploit is available
Vulnerable software:
dnaLIMS
dnaLIMS
Software vendor:
dnaTools, Inc.
dnaTools, Inc.
Description
The vulnerability allows a remote unauthenticated attacker to execute arbitrary commands on the target system.
The weakness exists due to improper security restrictions set on the administrative web shell, cgi-bin/dna/sysAdmin.cgi. A remote attacker can send a POST request to the targeted system, bypass authentication checks and execute arbitrary commands in the context of the web server process.
Successful exploitation of the vulnerability may result in system compromise.
The weakness exists due to improper security restrictions set on the administrative web shell, cgi-bin/dna/sysAdmin.cgi. A remote attacker can send a POST request to the targeted system, bypass authentication checks and execute arbitrary commands in the context of the web server process.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Install update from vendor's website.