An issue in Docmosis Tornado v.2.9.7 and before allows a remote attacker to execute arbitrary code via a crafted script to the UNC path input
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://github.com/Docmosis/tornado-docker/issues/14 | exploit |
https://github.com/Marsman1996/pocs/blob/master/redox/CVE-2024-57492/README.md | not applicable |