Lucene search

K
zdiEsteban Ruiz (mr_me) of Source InciteZDI-19-062
HistoryJan 19, 2019 - 12:00 a.m.

LAquis SCADA Web Server acompanhamentotela PAGINA Command Injection Remote Code Execution Vulnerability

2019-01-1900:00:00
Esteban Ruiz (mr_me) of Source Incite
www.zerodayinitiative.com
14

EPSS

0.053

Percentile

93.1%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA Software. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of calls to acompanhamentotela.lhtml. When parsing the PAGINA Element, the process does not properly sanitize user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to execute code in the context of the aq process.

EPSS

0.053

Percentile

93.1%