An issue in Eramba Limited Eramba Enterprise and Community edition v.3.19.1 allows a remote attacker to execute arbitrary code via the path parameter in the URL.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://eramba.com | broken link |
https://trovent.io/security-advisory-2303-01/ | third party advisory exploit |
https://trovent.github.io/security-advisories/TRSA-2303-01/TRSA-2303-01.txt | |
https://www.eramba.org |