Vulnerability Description
Security Onion Solutions Squert version 1.0.1 through 1.6.7 contains a CWE-78: Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) vulnerability in .inc/callback.php that can result in execution of OS Commands. This attack appear to be exploitable via Web request to .inc/callback.php with the payload in the txdata parameter, used in tx()/transcript(), or the catdata parameter, used in cat(). This vulnerability appears to have been fixed in 1.7.0.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Securityonion | Squert | >= 1.1.1, <= 1.6.7 |
Related Weaknesses (CWE)
References
- http://blog.securityonion.net/2018/01/security-advisory-for-squert.htmlPatchVendor Advisory
- http://blog.securityonion.net/2018/01/security-advisory-for-squert.htmlPatchVendor Advisory
FAQ
What is CVE-2018-1000043?
CVE-2018-1000043 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Security Onion Solutions Squert version 1.0.1 through 1.6.7 contains a CWE-78: Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) vulnerability in .inc/callback.p...
How severe is CVE-2018-1000043?
CVE-2018-1000043 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-1000043?
Check the references section above for vendor advisories and patch information. Affected products include: Securityonion Squert.