Description
Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_firewall.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation.
Problem types
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
Product status
3.3.25 (semver)
Credits
Alex Williams from Pellera Technologies
VulnCheck
References
help.endian.com/hc/en-us/sections/360004371358-Community (Endian Release Notes)
www.vulncheck.com/...irewall-cgi-date-perl-command-injection (VulnCheck Advisory: Endian Firewall /cgi-bin/logs_firewall.cgi DATE Perl Command Injection)