Lucene search

K
zdiEsteban Ruiz (mr_me) of Source InciteZDI-19-063
HistoryJan 19, 2019 - 12:00 a.m.

LAquis SCADA Web Server acompanhamentotela TAGALTERE Command Injection Remote Code Execution Vulnerability

2019-01-1900:00:00
Esteban Ruiz (mr_me) of Source Incite
www.zerodayinitiative.com
14

EPSS

0.053

Percentile

93.1%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA Software. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of calls to acompanhamentotela.lhtml. When parsing the TAGALTERE Element, the process does not properly sanitize user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to execute code under the context of the aq process.

EPSS

0.053

Percentile

93.1%