CVE-2015-2857
Severity CVSS v4.0:
Pending analysis
Type:
CWE-77
Command Injection
Publication date:
22/08/2017
Last modified:
20/04/2025
Description
Accellion File Transfer Appliance before FTA_9_11_210 allows remote attackers to execute arbitrary code via shell metacharacters in the oauth_token parameter.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:accellion:file_transfer_appliance:*:*:*:*:*:*:*:* | 9_11_200 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/132665/Accellion-FTA-getStatus-verify_oauth_token-Command-Execution.html
- http://www.rapid7.com/db/modules/exploit/linux/http/accellion_fta_getstatus_oauth
- https://community.rapid7.com/community/metasploit/blog/2015/07/10/r7-2015-08-accellion-file-transfer-appliance-vulnerabilities-cve-2015-2856-cve-2015-2857
- https://www.exploit-db.com/exploits/37597/
- http://packetstormsecurity.com/files/132665/Accellion-FTA-getStatus-verify_oauth_token-Command-Execution.html
- http://www.rapid7.com/db/modules/exploit/linux/http/accellion_fta_getstatus_oauth
- https://community.rapid7.com/community/metasploit/blog/2015/07/10/r7-2015-08-accellion-file-transfer-appliance-vulnerabilities-cve-2015-2856-cve-2015-2857
- https://www.exploit-db.com/exploits/37597/



