漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
An issue was discovered in Radisys MRF Web Panel (SWMS) 9.0.1. The MSM_MACRO_NAME POST parameter in /swms/ms.cgi was discovered to be vulnerable to OS command injection attacks. It is possible to use the pipe character (|) to inject arbitrary OS commands and retrieve the output in the application's responses. Attackers could execute unauthorized commands, which could then be used to disable the software, or read, write, and modify data for which the attacker does not have permissions to access directly. Since the targeted application is directly executing the commands instead of the attacker, any malicious activities may appear to come from the application or the application's owner (apache user).
漏洞信息
N/A
漏洞
N/A
漏洞
Radisys MRF Web Panel 命令注入漏洞
漏洞信息
Radisys MRF是美国锐德世(Radisys)公司的一套为电信、航空航天和国防应用提供无线基础设施解决方案的媒体资源服务。Radisys MRF Web Panel(SWMS)是其中的一个基于Web的管理面板。 Radisys MRF Web Panel (SWMS) 9.0.1版本中的/swms/ms.cgi文件的‘MSM_MACRO_NAME POST’函数存在OS命令注入漏洞。攻击者可利用该漏洞禁用软件,或读取、写入和更改数据。
漏洞信息
N/A
漏洞
N/A