← Volver a CVEs
CVE-2019-16305
HIGH8.8
Descripcion
In MobaXterm 11.1 and 12.1, the protocol handler is vulnerable to command injection. A crafted link can trigger a popup asking whether the user wants to run MobaXterm to handle the link. If accepted, another popup appears asking for further confirmation. If this is also accepted, command execution is achieved, as demonstrated by the MobaXterm://`calc` URI.
Detalles CVE
Puntuacion CVSS v3.18.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioREQUIRED
Publicado9/14/2019
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
microsoft:windowsmobatek:mobaxterm
Debilidades (CWE)
CWE-77
Referencias
https://freetom.github.io/0day/2019/09/14/MobaXterm-command-exec-in-protocol-handler.html(cve@mitre.org)
https://freetom.github.io/0day/2019/09/14/MobaXterm-command-exec-in-protocol-handler.html(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.