Unrated severityNVD Advisory· Published Apr 30, 2020· Updated Aug 4, 2024
Remote code execution in Message sending functionality in IntelMQ Manager
CVE-2020-11016
Description
IntelMQ Manager from version 1.1.0 and before version 2.1.1 has a vulnerability where the backend incorrectly handled messages given by user-input in the "send" functionality of the Inspect-tool of the Monitor component. An attacker with access to the IntelMQ Manager could possibly use this issue to execute arbitrary code with the privileges of the webserver. Version 2.1.1 fixes the vulnerability.
Affected products
1- Range: >= 1.1.0, < 2.1.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/certtools/intelmq-manager/commit/b9a2ac43a4f99d764b827108f6a99dc4a9faa013mitrex_refsource_MISC
- github.com/certtools/intelmq-manager/releases/tag/2.1.1mitrex_refsource_MISC
- github.com/certtools/intelmq-manager/security/advisories/GHSA-rrhh-rcgp-q2m2mitrex_refsource_CONFIRM
- lists.cert.at/pipermail/intelmq-users/2020-April/000161.htmlmitrex_refsource_MISC
News mentions
0No linked articles in our index yet.