Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
An issue was discovered in Radisys MRF Web Panel (SWMS) 9.0.1. The MSM_MACRO_NAME POST parameter in /swms/ms.cgi was discovered to be vulnerable to OS command injection attacks. It is possible to use the pipe character (|) to inject arbitrary OS commands and retrieve the output in the application's responses. Attackers could execute unauthorized commands, which could then be used to disable the software, or read, write, and modify data for which the attacker does not have permissions to access directly. Since the targeted application is directly executing the commands instead of the attacker, any malicious activities may appear to come from the application or the application's owner (apache user).
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Radisys MRF Web Panel 命令注入漏洞
Vulnerability Description
Radisys MRF是美国锐德世(Radisys)公司的一套为电信、航空航天和国防应用提供无线基础设施解决方案的媒体资源服务。Radisys MRF Web Panel(SWMS)是其中的一个基于Web的管理面板。 Radisys MRF Web Panel (SWMS) 9.0.1版本中的/swms/ms.cgi文件的‘MSM_MACRO_NAME POST’函数存在OS命令注入漏洞。攻击者可利用该漏洞禁用软件,或读取、写入和更改数据。
CVSS Information
N/A
Vulnerability Type
N/A