First published: Thu Dec 06 2018(Updated: )
An issue was discovered in MISP 2.4.9x before 2.4.99. In app/Model/Event.php (the STIX 1 import code), an unescaped filename string is used to construct a shell command. This vulnerability can be abused by a malicious authenticated user to execute arbitrary commands by tweaking the original filename of the STIX import.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MISP | >=2.4.90<2.4.99 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19908 is classified as a high severity vulnerability due to its potential for remote command execution.
To fix CVE-2018-19908, upgrade MISP to version 2.4.99 or later.
CVE-2018-19908 affects MISP versions from 2.4.90 to 2.4.98.
CVE-2018-19908 is a command injection vulnerability stemming from improper handling of filenames.
Yes, a malicious authenticated user can exploit CVE-2018-19908 to execute arbitrary commands.