On the 30th of October, D-Link published a support announcement and released a new firmware to patch five vulnerabilities that Harold Zang, Technical Security Specialist at Trustwave, identified on the DSL-2888A router. These security vulnerabilities could allow a malicious Wi-Fi or local network user to gain unauthorised access to the router web interface, obtain the router password hash, gain plaintext credentials, and execute system commands on the router.
Post Category → CVE
How did I find Command Injection in MVP-5150 (CVE-2019-11224)
Introduction
OS Command Injection is that the software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
This article describes that how did I find CVE-2019-11224 and three ways for bypassing “space” character while OS Command Injection.
CVE-2019-11224 Injection dangerous command into HARMAN AMX
Injection Dangerous Command into HARMAN AMX
Affected Vendor: AMX – https://www.amx.com/
Affected Software: MVP5150 Firmware
Affected Version: Tested on V2.87.13
Issue type: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)
Release Date: 07/05/2019
Discovered by: Harold Zang, Hivint
CVE Identifier: CVE-2019-11224
Issue status: Publish
CVE-2018-19453 Upload Malicious File in Kentico CMS
Upload Malicious File in Kentico CMS
Affected Vendor: Kentico – https://www.kentico.com
Affected Software: Kentico CMS
Affected Version: Tested on 11.0
Issue type: Unrestricted Upload of File with Dangerous Type
Release Date: 08/01/2019
Discovered by: Harold, Hivint
CVE Identifier: CVE-2018-19453
Issue status: Fixed (Hotfix 11.0.45)