CVE-2019-10863
Summary
| CVE | CVE-2019-10863 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-04-04 18:29:00 UTC |
| Updated | 2020-08-24 17:37:00 UTC |
| Description | A command injection vulnerability exists in TeemIp versions before 2.4.0. The new_config parameter of exec.php allows one to create a new PHP file with the exception of config information. The malicious PHP code sent is executed instantaneously and is not saved on the server. |
Risk And Classification
Problem Types: CWE-94
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Pentest Blog - Self-Improvement to Ethical Hacking | MISC | pentest.com.tr | Exploit, Patch, Third Party Advisory |
| TeemIp IPAM < 2.4.0 - 'new_config' Command Injection (Metasploit) - PHP remote Exploit | MISC | www.exploit-db.com | Exploit, Patch, Third Party Advisory, VDB Entry |
| TeemIp IPAM < 2.4.0 - 'new_config' Command Injection (Metasploit) - PHP remote Exploit | EXPLOIT-DB | www.exploit-db.com | Exploit, Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.