An issue was discovered in Scytl sVote 2.1. An attacker can inject code that gets executed by creating an election-event and injecting a payload over an event alias, because the application calls Runtime.getRuntime().exec() without validation.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://suid.ch/research/CVE-2019-25022.html |
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2021-02-27T04:21:59
Updated: 2024-08-05T03:00:18.979Z
Reserved: 2021-02-19T00:00:00
Link: CVE-2019-25022
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-02-27T05:15:13.237
Modified: 2024-11-21T04:39:45.680
Link: CVE-2019-25022
Redhat
No data.