An issue was discovered in Pascom Cloud Phone System before 7.20.x. In the management REST API, /services/apply in exd.pl allows remote attackers to execute arbitrary code via shell metacharacters.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://www.pascom.net/doc/en/release-notes/ | release notes vendor advisory |
https://kerbit.io/research/read/blog/4 | third party advisory exploit |
https://tutorialboy24.blogspot.com/2022/03/the-story-of-3-bugs-that-lead-to.html | third party advisory exploit |