10
CVSSv2

CVE-2012-0262

Published: 31/12/2013 Updated: 02/01/2014
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

op5config/welcome in system-op5config prior to 2.0.3 in op5 Monitor and op5 Appliance prior to 5.5.3 allows remote malicious users to execute arbitrary commands via shell metacharacters in the password parameter.

Vulnerable Product Search on Vulmon Subscribe to Product

op5 system-op5config

op5 monitor

op5 monitor 5.4.2

op5 monitor 5.5.0

op5 monitor 5.4.0

op5 monitor 5.3.5

Exploits

## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' ...