CVE-2020-11016
Severity CVSS v4.0:
Pending analysis
Type:
CWE-78
OS Command Injections
Publication date:
30/04/2020
Last modified:
06/05/2020
Description
IntelMQ Manager from version 1.1.0 and before version 2.1.1 has a vulnerability where the backend incorrectly handled messages given by user-input in the "send" functionality of the Inspect-tool of the Monitor component. An attacker with access to the IntelMQ Manager could possibly use this issue to execute arbitrary code with the privileges of the webserver. Version 2.1.1 fixes the vulnerability.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:intelmq_manager_project:intelmq_manager:*:*:*:*:*:*:*:* | 1.1.0 (including) | 2.1.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/certtools/intelmq-manager/commit/b9a2ac43a4f99d764b827108f6a99dc4a9faa013
- https://github.com/certtools/intelmq-manager/releases/tag/2.1.1
- https://github.com/certtools/intelmq-manager/security/advisories/GHSA-rrhh-rcgp-q2m2
- https://lists.cert.at/pipermail/intelmq-users/2020-April/000161.html



