Description
Epross AVCON6 systems management platform contains an object-graph navigation language (OGNL) injection vulnerability that allows unauthenticated attackers to execute arbitrary commands by injecting malicious OGNL expressions. Attackers can send crafted requests to the login.action endpoint with OGNL payloads in the redirect parameter to instantiate ProcessBuilder objects and execute system commands with root privileges.
Problem types
CWE-1334 Unauthorized Error Injection Can Degrade Hardware Redundancy
Product status
*
Credits
Nassim Asrir
References
www.exploit-db.com/exploits/47379 (ExploitDB-47379)
www.vulncheck.com/...-remote-code-execution-via-login-action (VulnCheck Advisory: Epross AVCON6 OGNL Remote Code Execution via login.action)