A vulnerability has been reported in the OmniPCX Enterprise Unified Maintenance Tool, which can be exploited by malicious people to compromise a vulnerable system.
Input passed to the "user" parameter in masterCGI is not properly sanitised before being used to execute commands. This can be exploited to inject and execute arbitrary shell commands with privileges of the running web server.
The vulnerability is reported in version R7.1. Prior versions may also be affected.
Solution: Apply patches (see vendor advisory for details).
Provided and/or discovered by: The vendor credits RedTeam Pentesting.
Original Advisory: Alcatel-Lucent:
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org