XPLATFORM code execution | CVE-2021-26626
NAME
XPLATFORM code execution
- Platforms Affected:
Tobesoft XPLATFORM 9.2
Tobesoft XPLATFORM 9.2.1
Tobesoft XPLATFORM 9.2.2
Tobesoft XPlatform 9.1
TOBESOFT XPLATFORM 9.2.2.250
Tobesoft XPLATFORM 9.2.2.270 - Risk Level:
8.1 - Exploitability:
Unproven - Consequences:
Gain Access
DESCRIPTION
XPLATFORM could allow a remote attacker to execute arbitrary code on the system, caused by improper input validation in the execBrowser method. By using a default parameter value, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS 3.0 Information
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Access Vector: Network
- Access Complexity: Low
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: None
- Remediation Level: Official Fix
MITIGATION
Upgrade to the latest version of XPLATFORM (9.2.2.280 or later), available from the TOBESOFT Web site. See References.
- Reference Link:
https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66662 - Reference Link:
https://www.tobesoft.com/product/Xplatform.do
If you like the site, please consider joining the telegram channel and supporting us on Patreon using the button below.