op5 7.1.9 Remote Command Execution

Discussion in 'News Aggregator' started by Packet Storm, 7 Apr 2016.

  1. Packet Storm

    Packet Storm Guest

    op5 has a cross site request forgery entry point that can be used to execute arbitrary remote commands on op5 system sent via HTTP GET requests, allowing attackers to completely takeover the affected host. To be victimized a user must be authenticated and visit a malicious webpage or click an infected link. Version 7.1.9 is affected.

    Continue reading...
     

Share This Page

Loading...