First published: Sun Jul 25 2021(Updated: )
NCH IVM Attendant v5.12 and earlier suffers from a directory traversal weakness upon uploading plugins in a ZIP archive. This can lead to code execution if a ZIP element's pathname is set to a Windows startup folder, a file for the inbuilt Out-Going Message function, or a file for the the inbuilt Autodial function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nchsoftware Ivm Attendant | <=5.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-37444 is a vulnerability in NCH IVM Attendant v5.12 and earlier that allows for directory traversal and potential code execution.
CVE-2021-37444 has a severity rating of 8.8 (High).
NCH IVM Attendant v5.12 and earlier are affected by CVE-2021-37444.
CVE-2021-37444 exploits a directory traversal weakness upon uploading plugins in a ZIP archive, allowing for potential code execution.
Yes, you can find more information about CVE-2021-37444 at the following links: [GitHub PoC](https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_RCE.md) and [NCH IVM Attendant](https://www.nch.com.au/ivm/index.html).