EPrints 3.4.2 allows remote attackers to read arbitrary files and possibly execute commands via crafted LaTeX input to a cgi/latex2png?latex= URI.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://files.eprints.org/2549/ | patch vendor advisory |
https://files.eprints.org/2548/ | patch vendor advisory |
https://github.com/grymer/CVE/blob/master/eprints_security_review.pdf | exploit third party advisory patch |