6.8
CVSSv2

CVE-2019-19469

Published: 01/12/2019 Updated: 24/08/2020
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

In Zmanda Management Console 3.3.9, ZMC_Admin_Advanced?form=adminTasks&action=Apply&command= allows CSRF, as demonstrated by command injection with shell metacharacters. This may depend on weak default credentials.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

zmanda amanda 3.3.9

Github Repositories

Weak default credentials in combination with missing input validation allow a remote attacker to execute arbitrary code on a server using the Zmanda Management Console 3.3.9.

Zmanda Management Console 339 - RCE (CVE-2019-19469) Weak default credentials in combination with missing input validation allow a remote attacker to execute arbitrary code on a server using the Zmanda Management Console 339 Description It's possible to execute whitelisted commands using the following link without any CSRF protection: 10123456/ZMC_Admin_Ad