Required CVE Record Information
Description
An issue was discovered in MISP 2.4.9x before 2.4.99. In app/Model/Event.php (the STIX 1 import code), an unescaped filename string is used to construct a shell command. This vulnerability can be abused by a malicious authenticated user to execute arbitrary commands by tweaking the original filename of the STIX import.
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 3 Total
- https://github.com/MISP/MISP/commit/211ac0737281b65e7da160f0aac52f401a94e1a3 x_transferred
- https://github.com/MISP/MISP/releases/tag/v2.4.99 x_transferred
- exploit-db.com: 46401 exploitx_transferred