LG SuperSign CMS allows remote attackers to execute arbitrary code via the sourceUri parameter to qsr_server/device/getThumbnail.
References
Link | Resource |
---|---|
http://mamaquieroserpentester.blogspot.com/2018/09/lg-supersign-rce-to-luna-and-back-to.html | Exploit Technical Description Third Party Advisory |
http://packetstormsecurity.com/files/152733/LG-Supersign-EZ-CMS-Remote-Code-Execution.html | |
https://www.exploit-db.com/exploits/45448/ | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/46795/ | |
http://mamaquieroserpentester.blogspot.com/2018/09/lg-supersign-rce-to-luna-and-back-to.html | Exploit Technical Description Third Party Advisory |
http://packetstormsecurity.com/files/152733/LG-Supersign-EZ-CMS-Remote-Code-Execution.html | |
https://www.exploit-db.com/exploits/45448/ | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/46795/ |
Configurations
History
No history.
Information
Published : 2018-09-21 17:29
Updated : 2024-11-21 03:54
NVD link : CVE-2018-17173
Mitre link : CVE-2018-17173
CVE.ORG link : CVE-2018-17173
JSON object : View
Products Affected
lg
- supersign_cms
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')