[prev in list] [next in list] [prev in thread] [next in thread]
List: full-disclosure
Subject: [FD] NEProfile - Remote Code Execution
From: <ghost () undervurse ! com>
Date: 2020-07-15 3:15:26
Message-ID: 20200714201526.88b681e8e47ce515952fa583de64f17a.3652a134e1.mailapi () email25 ! godaddy ! com
[Download RAW message or body]
Exploit Title: NEProfile - Remote Code Execution
Date: 5/13/2020
Vendor Homepage: https://seczetta.com
Software Link: https://seczetta.com/product/ne-profile
Version: 3.3.11
Tested on: 3.3.11
Exploit Author: Josh Sheppard
Exploit Contact: ghost () a t undervurse dot_com
Exploit Technique: Remote
CVE ID: CVE-2020-12854
1. Description
A remote code execution vulnerability was identified in SecZetta's NEProfile product. \
Authenticated remote adversaries can invoke code execution upon uploading a carefully crafted \
jpg as part of the profile avatar.
The issue affects version 3.3.11 and has not been tested on other versions of the product.
2. Disclosure Timeline
5/4/20 - Discovery and Exploitation
5/12/20 - Vendor Notified
6/18/20 - Patch / Hotfix Created
3. Mitigation
Apply hotfix provided by vendor
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic