CVE-2019-5029

Scores

EPSS

0.852high85.2%
0%20%40%60%80%100%

Percentile: 85.2%

CVSS

9.8critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
10.0

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Description

An exploitable command injection vulnerability exists in the Config editor of the Exhibitor Web UI versions 1.0.9 to 1.7.1. Arbitrary shell commands surrounded by backticks or $() can be inserted into the editor and will be executed by the Exhibitor process when it launches ZooKeeper. An attacker can execute any command as the user running the Exhibitor process.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-78

Related Vulnerabilities

Exploits

Exploit ID: 48654

Source: exploitdb

URL: https://www.exploit-db.com/exploits/48654

Exploit ID: CVE-2019-5029

Source: github-poc

URL: https://github.com/yZee00/CVE-2019-5029

Vulnerable Software (1)

Type: Configuration

Vendor: *

Product: exhibitor

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:exhibitor_project:exhibitor:*:*:*:*:*:*:*:*",      "versionEndIncluding": "1.7.1",      "versionStartIncluding": "1.0.9",      "vulnerable": tr...

Source: nvd

End of list