First published: Mon Feb 12 2018(Updated: )
In app/Controller/ServersController.php in MISP 2.4.87, a server setting permitted the override of a path variable on certain Red Hed Enterprise Linux and CentOS systems (where rh_shell_fix was enabled), and consequently allowed site admins to inject arbitrary OS commands. The impact is limited by the setting being only accessible to the site administrator.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MISP | =2.4.87 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-6926 has been assigned a high severity due to the potential for arbitrary OS command injection.
To fix CVE-2018-6926, update MISP to a version later than 2.4.87 where the vulnerability has been patched.
CVE-2018-6926 affects MISP version 2.4.87 running on Red Hat Enterprise Linux and CentOS with rh_shell_fix enabled.
CVE-2018-6926 is classified as a command injection vulnerability.
The implications of CVE-2018-6926 include potential complete system compromise through the execution of arbitrary commands by site admins.