First published: Fri Aug 03 2018(Updated: )
OCS Inventory 2.4.1 is prone to a remote command-execution vulnerability. Specifically, this issue occurs because the content of the ipdiscover_analyser rzo GET parameter is concatenated to a string used in an exec() call in the PHP code. Authentication is needed in order to exploit this vulnerability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ocsinventory-ng ocsinventory NG | =2.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-12483 is categorized as medium, indicating a significant risk of exploitation.
To fix CVE-2018-12483, upgrade to OCS Inventory version 2.4.2 or later, where this vulnerability has been patched.
CVE-2018-12483 affects users of OCS Inventory version 2.4.1, specifically those who have access to the affected PHP script.
CVE-2018-12483 is a remote command execution vulnerability that allows attackers to execute arbitrary commands on the server.
Yes, authentication is required to exploit CVE-2018-12483, meaning that an attacker must have valid user credentials to execute the attack.