First published: Fri Sep 21 2018(Updated: )
LG SuperSign CMS allows remote attackers to execute arbitrary code via the sourceUri parameter to qsr_server/device/getThumbnail.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
LG SuperSign CMS | =2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-17173 is critical with a score of 9.8.
CVE-2018-17173 allows remote attackers to execute arbitrary code through the sourceUri parameter in qsr_server/device/getThumbnail.
Version 2.5 of LG SuperSign CMS is affected by CVE-2018-17173.
Yes, there are known exploits for CVE-2018-17173. Some references to these exploits can be found at: [reference 1](http://mamaquieroserpentester.blogspot.com/2018/09/lg-supersign-rce-to-luna-and-back-to.html), [reference 2](http://packetstormsecurity.com/files/152733/LG-Supersign-EZ-CMS-Remote-Code-Execution.html), and [reference 3](https://www.exploit-db.com/exploits/45448/).
The CWE category of CVE-2018-17173 is CWE-94, which is for Improper Control of Generation of Code (Code Injection).