Vulnerability Description
A command injection vulnerability exists in the eScan Web Management Console version 5.5-2. The application fails to properly sanitize the 'pass' parameter when processing login requests to login.php, allowing an authenticated attacker with a valid username to inject arbitrary commands via a specially crafted password value. Successful exploitation results in remote code execution. Privilege escalation to root is possible by abusing the runasroot utility with mwconf-level privileges.
Related Weaknesses (CWE)
References
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exp
- https://www.exploit-db.com/exploits/32869
- https://www.vulncheck.com/advisories/escan-web-management-console-command-inject
FAQ
What is CVE-2014-125118?
CVE-2014-125118 is a documented vulnerability. A command injection vulnerability exists in the eScan Web Management Console version 5.5-2. The application fails to properly sanitize the 'pass' parameter when processing login requests to login.php,...
How severe is CVE-2014-125118?
CVSS scoring is not yet available for CVE-2014-125118. Check NVD for updates.
Is there a patch for CVE-2014-125118?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.