An OS command injection vulnerability in lib/NSSDropoff.php in ZendTo 5.24-3 through 6.x before 6.10-7 allows unauthenticated remote attackers to execute arbitrary commands via shell metacharacters in the tmp_name parameter when dropping off a file via a POST /dropoff request.
History

Mon, 07 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 05 Apr 2025 05:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-78
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Sat, 05 Apr 2025 05:15:00 +0000

Type Values Removed Values Added
Description An OS command injection vulnerability in lib/NSSDropoff.php in ZendTo 5.24-3 through 6.x before 6.10-7 allows unauthenticated remote attackers to execute arbitrary commands via shell metacharacters in the tmp_name parameter when dropping off a file via a POST /dropoff request.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-04-05T00:00:00.000Z

Updated: 2025-04-07T16:22:26.249Z

Reserved: 2025-04-05T00:00:00.000Z

Link: CVE-2021-47667

cve-icon Vulnrichment

Updated: 2025-04-07T16:22:16.500Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-05T05:15:43.223

Modified: 2025-04-07T17:15:32.873

Link: CVE-2021-47667

cve-icon Redhat

No data.