NEC EXPRESSCLUSTER X Web Manager Command Execution
2021-11-01 12:00:09 Author: blog.exodusintel.com(查看原文) 阅读量:28 收藏

EIP-2015-0018

A remote command execution vulnerability has been found in NEC EXPRESSCLUSTER X. WebManager (clpwebmc.exe) is a webserver tasked with providing remote administrative access, it is configured to utilize port 29003 by default. This vulnerability occurs due to a command injection vulnerability in “LogCollect.js”. An attacker is able to specify arbitrary commands that will be executed in the context of SYSTEM.

Vulnerability Identifiers

  • Exodus Intelligence: EIP-2015-0018
  • MITRE CVE: CVE-2021-20706

Vulnerability Metrics

  • CVSSv2 Score: 10.0

Vendor References

Discovery Credit

  • Exodus Intelligence

Disclosure Timeline

  • Disclosed to affected vendor: February 25th, 2021
  • Disclosed to public: October 29th, 2021

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at [email protected].

Researchers who are interested in monetizing their 0Day and NDay can work with us through our Research Sponsorship Program.


文章来源: https://blog.exodusintel.com/2021/10/31/nec-expresscluster-x-web-manager-command-execution/?utm_source=rss&utm_medium=rss&utm_campaign=nec-expresscluster-x-web-manager-command-execution
如有侵权请联系:admin#unsafe.sh