First published: Thu May 31 2018(Updated: )
The '/common/ajax_email_connection_test.php' script in the Quest KACE System Management Appliance 8.0.318 is accessible by any authenticated user and can be abused to execute arbitrary commands on the system. This script is vulnerable to command injection via the unsanitized user input 'TEST_SERVER' sent to the script via the POST method.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Quest KACE Systems Management Appliance | =8.0.318 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11139 is considered to have a high severity due to its potential for arbitrary command execution.
To fix CVE-2018-11139, ensure that the affected Quest KACE System Management Appliance is updated to a patched version that sanitizes user inputs.
Any authenticated user of the Quest KACE System Management Appliance version 8.0.318 is potentially affected by CVE-2018-11139.
CVE-2018-11139 allows attackers to perform command injection attacks by exploiting the unsanitized input in the '/common/ajax_email_connection_test.php' script.
CVE-2018-11139 is not localized and can be exploited by any authenticated user irrespective of their geographical location.