First published: Tue Apr 13 2021(Updated: )
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated arbitrary file upload vulnerability. IPM’s maps_srv.js allows an attacker to upload a malicious NodeJS file using uploadBackgroud action. An attacker can upload a malicious code or execute any command using a specially crafted packet to exploit the vulnerability.
Credit: CybersecurityCOE@eaton.com
Affected Software | Affected Version | How to fix |
---|---|---|
Eaton Intelligent Power Manager | <1.69 | |
Eaton Intelligent Power Manager Virtual Appliance | <1.69 | |
Eaton Intelligent Power Protector | <1.68 |
upgrade the software to latest version 1.69
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-23280 is a vulnerability in Eaton Intelligent Power Manager (IPM) prior to 1.69 that allows an attacker to upload a malicious NodeJS file.
CVE-2021-23280 has a severity rating of 9.9 out of 10, which is considered critical.
CVE-2021-23280 affects Eaton Intelligent Power Manager versions prior to 1.69, allowing an attacker to perform an authenticated arbitrary file upload.
An attacker can exploit CVE-2021-23280 by uploading a malicious NodeJS file using the 'uploadBackground' action in IPM's 'maps_srv.js' file.
Yes, updating Eaton Intelligent Power Manager to version 1.69 or higher will fix the CVE-2021-23280 vulnerability.