7.5
CVSSv2

CVE-2015-2857

Published: 22/08/2017 Updated: 09/09/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Accellion File Transfer Appliance before FTA_9_11_210 allows remote malicious users to execute arbitrary code via shell metacharacters in the oauth_token parameter.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

accellion file transfer appliance

Exploits

## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' ...