Description
This vulnerability allows authenticated attackers to execute arbitrary commands on the underlying system using the file name of an uploaded file.
Product status
<9.2.3.3 (custom)
References
wiki.zenitel.com/wiki/Turbine_9.3_-_Release_notes (Zenitel Release Notes Turbine)
www.zenitel.com/.../A100K12333 Zenitel Security Advisory.pdf (Zenitel Security Advisory)
wiki.zenitel.com/wiki/VSF-Fortitude8_9.3_Release_Notes (Zenitel Release Notes Fortitude8)
wiki.zenitel.com/wiki/ZIPS_9.3_-_Release_notes (Zenitel Release Notes ZIPS)
wiki.zenitel.com/wiki/VSF-Fortitude6_9.3_Release_Notes (Zenitel Release Notes Fortitude6)
wiki.zenitel.com/wiki/VSF-Display_Series_9.3_Release_Notes (Zenitel Release Notes Display Series)