SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x contains a conditional command injection vulnerability that allows local authenticated users to create malicious files in the /tmp directory. Unauthenticated attackers can execute commands by making a single HTTP POST request to the traceroute.php script, which triggers the malicious file and then deletes it after execution.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50795.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.15"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.69"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.15"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.69"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.15"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.69"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.16"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.16"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.30"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.4.29"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.11"
}
]
}
]