An issue was discovered in EyesOfNetwork 5.3 through 5.3-8. An authenticated web user with sufficient privileges could abuse the AutoDiscovery module to run arbitrary OS commands via the nmap_binary parameter to lilac/autodiscovery.php.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://www.eyesofnetwork.com/en | product |
http://download.eyesofnetwork.com/EyesOfNetwork-5.3-x86_64-bin.iso | product vendor advisory patch |
https://github.com/EyesOfNetworkCommunity/eonweb/issues/76 | third party advisory |