This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Reporter. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the Token parameter provided to the LogonResource endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
AVEVA Reports for Operations |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-21-154 is classified as a critical severity vulnerability due to its potential for remote code execution.
To fix ZDI-21-154, it is recommended to update Micro Focus Operations Bridge Reporter to the latest security patch provided by the vendor.
ZDI-21-154 allows remote attackers to execute arbitrary code, which can lead to complete system compromise.
No, ZDI-21-154 can be exploited without authentication, making it particularly dangerous.
ZDI-21-154 affects Micro Focus Operations Bridge Reporter installations.