FaceSentry 6.4.8 contains an authenticated remote command injection vulnerability in pingTest.php and tcpPortTest.php scripts. Attackers can exploit unsanitized input parameters to inject and execute arbitrary shell commands with root privileges by manipulating the 'strInIP' and 'strInPort' parameters.
Attack Parameters
Impact Assessment
CVSS Vector v4.0
Weakness Type (CWE)
Vulnerable Products 6
| Configuration | From (including) | Up to (excluding) |
|---|---|---|
|
Iwt Facesentry_Access_Control_System_Firmware
cpe:2.3:o:iwt:facesentry_access_control_system_firmware:5.7.0:*:*:*:*:*:*:*
|
— | — |
|
Iwt Facesentry_Access_Control_System
cpe:2.3:h:iwt:facesentry_access_control_system:-:*:*:*:*:*:*:*
|
— | — |
|
Iwt Facesentry_Access_Control_System_Firmware
cpe:2.3:o:iwt:facesentry_access_control_system_firmware:5.7.2:*:*:*:*:*:*:*
|
— | — |
|
Iwt Facesentry_Access_Control_System
cpe:2.3:h:iwt:facesentry_access_control_system:-:*:*:*:*:*:*:*
|
— | — |
|
Iwt Facesentry_Access_Control_System_Firmware
cpe:2.3:o:iwt:facesentry_access_control_system_firmware:6.4.8:*:*:*:*:*:*:*
|
— | — |
|
Iwt Facesentry_Access_Control_System
cpe:2.3:h:iwt:facesentry_access_control_system:-:*:*:*:*:*:*:*
|
— | — |