10
CVSSv2

CVE-2007-3010

Published: 18/09/2007 Updated: 16/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

masterCGI in the Unified Maintenance Tool in Alcatel OmniPCX Enterprise Communication Server R7.1 and previous versions allows remote malicious users to execute arbitrary commands via shell metacharacters in the user parameter during a ping action.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

alcatel-lucent omnipcx 7.1

Exploits

Alcatel-Lucent OmniPCX suffers from a remote command execution vulnerability Details provided ...
## # $Id$ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote include Ms ...
## # $Id: alcatel_omnipcx_mastercgi_execrb 10556 2010-10-05 23:13:04Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'm ...
source: wwwsecurityfocuscom/bid/25694/info Alcatel-Lucent OmniPCX Enterprise is prone to a remote command-execution vulnerability because it fails to adequately sanitize user-supplied data Attackers can exploit this issue to execute arbitrary commands with the privileges of the 'httpd' user Successful attacks may facilitate a compromis ...