Vulnerability Description
Ovidentia version 8.4.3 and earlier contains a Unsanitized User Input vulnerability in utilit.php, bab_getAddonFilePathfromTg that can result in Authenticated Remote Code Execution. This attack appear to be exploitable via The attacker must have permission to upload addons.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ovidentia | Ovidentia | <= 8.4.3 |
Related Weaknesses (CWE)
References
- https://drive.google.com/open?id=195h-LirGiIVKxioyusw3SvmLp8BljPxeTechnical DescriptionThird Party Advisory
- https://www.ovidentia.org/index.php?Vendor Advisory
- https://www.ovidentia.org/modulesVendor Advisory
- https://drive.google.com/open?id=195h-LirGiIVKxioyusw3SvmLp8BljPxeTechnical DescriptionThird Party Advisory
- https://www.ovidentia.org/index.php?Vendor Advisory
- https://www.ovidentia.org/modulesVendor Advisory
FAQ
What is CVE-2018-1000619?
CVE-2018-1000619 is a vulnerability with a CVSS score of 8.8 (HIGH). Ovidentia version 8.4.3 and earlier contains a Unsanitized User Input vulnerability in utilit.php, bab_getAddonFilePathfromTg that can result in Authenticated Remote Code Execution. This attack appear...
How severe is CVE-2018-1000619?
CVE-2018-1000619 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-1000619?
Check the references section above for vendor advisories and patch information. Affected products include: Ovidentia Ovidentia.