First published: Thu Mar 06 2014(Updated: )
delivery.php in the Passive Capture Application (PCA) web console in IBM Tealeaf CX 7.x, 8.x through 8.6, 8.7 before FP2, and 8.8 before FP2 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the testconn_host parameter.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Tealeaf Customer Experience | =7.1 | |
IBM Tealeaf Customer Experience | =7.2 | |
IBM Tealeaf Customer Experience | =8.0 | |
IBM Tealeaf Customer Experience | =8.1 | |
IBM Tealeaf Customer Experience | =8.2 | |
IBM Tealeaf Customer Experience | =8.3 | |
IBM Tealeaf Customer Experience | =8.4 | |
IBM Tealeaf Customer Experience | =8.5 | |
IBM Tealeaf Customer Experience | =8.6 | |
IBM Tealeaf Customer Experience | =8.7 | |
IBM Tealeaf Customer Experience | =8.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6719 has a high severity rating due to the potential for remote command execution by authenticated users.
To fix CVE-2013-6719, it is recommended to upgrade to IBM Tealeaf CX versions 8.6 FP2 or 8.7 FP2 and later.
CVE-2013-6719 affects all versions of IBM Tealeaf CX from 7.1 through 8.7 before FP2.
No, CVE-2013-6719 requires an authenticated user to exploit the vulnerability.
CVE-2013-6719 allows attackers to execute arbitrary commands on the server via shell metacharacters.