An issue was discovered in MISP 2.4.9x before 2.4.99. In app/Model/Event.php (the STIX 1 import code), an unescaped filename string is used to construct a shell command. This vulnerability can be abused by a malicious authenticated user to execute arbitrary commands by tweaking the original filename of the STIX import.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T11:51:17.746Z
Reserved: 2018-12-06T00:00:00
Link: CVE-2018-19908

No data.

Status : Modified
Published: 2018-12-06T16:29:00.290
Modified: 2024-11-21T03:58:47.737
Link: CVE-2018-19908

No data.