Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_ids.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation.
| Vendor | Product | Versions |
|---|---|---|
| endian | endian firewall | 3.3.25 |
Updated severity to CRITICAL, marked as actively exploited, and provided a more detailed description of the vulnerability.
Initial creation