.. / CVE-2021-46704

Exploit for GenieACS => 1.2.8 - OS Command Injection (CVE-2021-46704)

Description:

In GenieACS 1.2.x before 1.2.8, the UI interface API is vulnerable to unauthenticated OS command injection via the ping host argument (lib/ui/api.ts and lib/ping.ts). The vulnerability arises from insufficient input validation combined with a missing authorization check.

Nuclei Template

View the template here CVE-2021-46704.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2021/CVE-2021-46704.yaml
Copy

References:

https://twitter.com/shaybt12/status/1671598239835906058
https://github.com/advisories/GHSA-2877-693q-pj33
https://github.com/genieacs/genieacs/commit/7f295beeecc1c1f14308a93c82413bb334045af6
https://github.com/genieacs/genieacs/releases/tag/v1.2.8
https://nvd.nist.gov/vuln/detail/CVE-2021-46704