8.8
CVSSv3

CVE-2017-6087

Published: 24/03/2017 Updated: 03/10/2019
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 655
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

EyesOfNetwork ("EON") 5.0 and previous versions allows remote authenticated users to execute arbitrary code via shell metacharacters in the selected_events[] parameter in the (1) acknowledge, (2) delete, or (3) ownDisown function in module/monitoring_ged/ged_functions.php or the (4) module parameter to module/index.php.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

eonweb project eonweb

Exploits

# [CVE-2017-6087] EON 50 Remote Code Execution ## Description EyesOfNetwork ("EON") is an OpenSource network monitoring solution ## Remote Code Execution (authenticated) The Eonweb code does not correctly filter arguments, allowing authenticated users to execute arbitrary code **CVE ID**: CVE-2017-6087 **Access Vector**: remote **Security ...
EON versions 50 and below suffer from a remote code execution vulnerability ...