Vulnerability Description
Vulnerability in Fidelis Network and Deception CommandPost enables authenticated command injection through the web interface using the “feed_comm_test” value for the “feed” parameter. The vulnerability could allow a specially crafted HTTP request to execute system commands on the CommandPost and return results in an HTTP response via an authenticated session. The vulnerability is present in Fidelis Network and Deception versions prior to 9.4.5. Patches and updates are available to address this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fidelissecurity | Deception | < 9.4.5 |
| Fidelissecurity | Network | < 9.4.5 |
Related Weaknesses (CWE)
References
- https://fidelissecurity.zendesk.com/hc/en-us/articles/6211730139411Permissions RequiredVendor Advisory
- https://fidelissecurity.zendesk.com/hc/en-us/articles/6211730139411Permissions RequiredVendor Advisory
FAQ
What is CVE-2022-24392?
CVE-2022-24392 is a vulnerability with a CVSS score of 8.8 (HIGH). Vulnerability in Fidelis Network and Deception CommandPost enables authenticated command injection through the web interface using the “feed_comm_test” value for the “feed” parameter. The vulnerabilit...
How severe is CVE-2022-24392?
CVE-2022-24392 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-24392?
Check the references section above for vendor advisories and patch information. Affected products include: Fidelissecurity Deception, Fidelissecurity Network.