CVE-2024-0054Improper Neutralization of Wildcards or Matching Symbols in Communications AB Axis OS

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 78.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 19

Description

Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX APIs local_list.cgi, create_overlay.cgi and irissetup.cgi was vulnerable for file globbing which could lead to a resource exhaustion attack. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages1 packages

CVEListV5axis_communications_ab/axis_osAXIS OS 6.50 - 11.8

🔴Vulnerability Details

2
CVEList
CVE-2024-0054: Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX APIs local_list2024-03-19
GHSA
GHSA-477q-5hxf-4xr2: Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX APIs local_list2024-03-19
CVE-2024-0054 — Communications AB Axis OS vulnerability | cvebase