Initial cleanups for syntax errors

patch-1
sullo 2023-03-27 09:23:39 -04:00
parent 1f336277f3
commit c85f239339
3 changed files with 2 additions and 3 deletions

View File

@ -5,7 +5,7 @@ info:
author: Random_Robbie
severity: critical
description: |
Apache Struts 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 is susceptible to remote command injection attacks. The Jakarta Multipart parser has incorrect exception handling and error-message generation during file upload attempts, which can allow an attacker to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header. This was exploited in March 2017 with a Content-Type header containing a #cmd= string.
Apache Struts 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 is susceptible to remote command injection attacks. The Jakarta Multipart parser has incorrect exception handling and error-message generation during file upload attempts, which can allow an attacker to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header. This was exploited in March 2017 with a Content-Type header containing a #cmd= string.
reference:
- https://github.com/mazen160/struts-pwn
- https://isc.sans.edu/diary/22169

View File

@ -3,7 +3,7 @@ id: envision-gateway
info:
name: EnvisionGateway Scheduler Panel - Detect
author: dhiyaneshDK
severity: medium
severity: info
description: EnvisionGateway scheduler panel was detected.
reference:
- https://www.exploit-db.com/ghdb/7315

View File

@ -12,7 +12,6 @@ info:
- https://www.zdnet.com/article/mobileiron-customers-urged-to-patch-systems-due-to-potential-log4j-exploitation/
- https://logging.apache.org/log4j/2.x/security.html
- https://nvd.nist.gov/vuln/detail/CVE-2021-44228
remediation: Upgrade to version 2.14.2 or higher of MobileIron. If this is not possible, several log4j exploit workarounds are available.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10