Command Injection in Simiki v1.6.2.1 and prior allows remote attackers to execute arbitrary system commands via line 64 of the component 'simiki/blob/master/simiki/config.py'.
References
| Link | Resource |
|---|---|
| https://cwe.mitre.org/data/definitions/77.html | Technical Description |
| https://github.com/tankywoo/simiki/issues/123 | Exploit Issue Tracking Third Party Advisory |
| https://cwe.mitre.org/data/definitions/77.html | Technical Description |
| https://github.com/tankywoo/simiki/issues/123 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 05:08
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://cwe.mitre.org/data/definitions/77.html - Technical Description | |
| References | () https://github.com/tankywoo/simiki/issues/123 - Exploit, Issue Tracking, Third Party Advisory |
Information
Published : 2021-08-27 19:15
Updated : 2024-11-21 05:08
NVD link : CVE-2020-19001
Mitre link : CVE-2020-19001
CVE.ORG link : CVE-2020-19001
JSON object : View
Products Affected
simiki_project
- simiki
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
