Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated eval injection vulnerability. The software does not neutralize code syntax from users before using in the dynamic evaluation call in loadUserFile function under scripts/libs/utils.js. Successful exploitation can allow attackers to control the input to the function and execute attacker controlled commands.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: Eaton
Published:
Updated: 2024-09-16T18:38:30.132Z
Reserved: 2021-01-08T00:00:00
Link: CVE-2021-23277

No data.

Status : Modified
Published: 2021-04-13T19:15:14.740
Modified: 2024-11-21T05:51:29.183
Link: CVE-2021-23277

No data.