The Orpak SiteOmat OrCU component is vulnerable to code injection, for all versions prior to 2017-09-25, due to a search query that uses a direct shell command. By tampering with the request, an attacker is able to run shell commands and receive valid output from the device.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://www.orpak.com | vendor advisory |
https://ics-cert.us-cert.gov/advisories/ICSA-19-122-01 | third party advisory us government resource |
http://www.securityfocus.com/bid/108167 | vdb entry third party advisory |