First published: Sun Sep 03 2017(Updated: )
In the EyesOfNetwork web interface (aka eonweb) 5.1-0, module\tool_all\tools\interface.php does not properly restrict exec calls, which allows remote attackers to execute arbitrary commands via shell metacharacters in the host_list parameter to module/tool_all/select_tool.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
EyesOfNetwork EyesOfNetwork | =5.1-0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14118 has been classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2017-14118, update the EyesOfNetwork web interface to the latest version that addresses this vulnerability.
The implications of CVE-2017-14118 include the possibility of unauthorized command execution, which can compromise system integrity and confidentiality.
CVE-2017-14118 affects users of EyesOfNetwork web interface version 5.1-0.
Attackers can exploit CVE-2017-14118 by sending crafted requests to the affected software, utilizing shell metacharacters in the host_list parameter.