WebInterface in OctoBot before 0.4.4 allows remote code execution because Tentacles upload is mishandled.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://www.octobot.online/ | vendor advisory |
https://packetstormsecurity.com/files/167721/Sashimi-Evil-OctoBot-Tentacle.html | vdb entry third party advisory |
https://github.com/Nwqda/Sashimi-Evil-OctoBot-Tentacle | third party advisory exploit |
https://github.com/Drakkar-Software/OctoBot/issues/1966 | third party advisory exploit |
https://github.com/Drakkar-Software/OctoBot/blob/master/CHANGELOG.md | third party advisory |
http://packetstormsecurity.com/files/167780/OctoBot-WebInterface-0.4.3-Remote-Code-Execution.html | third party advisory exploit |