Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
The Tightrope Media Carousel digital signage product 7.0.4.104 contains an arbitrary file upload vulnerability in the Manage Bulletins/Upload feature, which can be leveraged to gain remote code execution. An authenticated attacker can upload a crafted ZIP file (based on an exported backup of existing "Bulletins") containing a malicious file. When uploaded, the system only checks for the presence of the needed files within the ZIP and, as long as the malicious file is named properly, will extract all contained files to a new directory on the system, named with a random GUID. The attacker can determine this GUID by previewing an image from the uploaded Bulletin within the web UI. Once the GUID is determined, the attacker can navigate to the malicious file and execute it. In testing, an ASPX web shell was uploaded, allowing for remote-code execution in the context of a restricted IIS user.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Tightrope Media System Carousel digital signage 代码问题漏洞
Vulnerability Description
Tightrope Media System Carousel digital signage是美国Tightrope Media System公司的一套数字标牌管理系统。 Tightrope Media Carousel digital signage 7.0.4.104版本中的Manage Bulletins/Upload功能存在任意文件上传漏洞,该漏洞源于程序仅检查了ZIP文件中所需的文件而没有检查名称正确的恶意文件。攻击者可通过上传特制的ZIP文件利用该漏洞执行恶意的文件。
CVSS Information
N/A
Vulnerability Type
N/A