CVE-2021-47667

An OS command injection vulnerability in lib/NSSDropoff.php in ZendTo 5.24-3 through 6.x before 6.10-7 allows unauthenticated remote attackers to execute arbitrary commands via shell metacharacters in the tmp_name parameter when dropping off a file via a POST /dropoff request.
Configurations

No configuration.

History

07 Apr 2025, 17:15

Type Values Removed Values Added
References () https://projectblack.io/blog/zendto-nday-vulnerabilities/ - () https://projectblack.io/blog/zendto-nday-vulnerabilities/ -

07 Apr 2025, 14:17

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad de inyección de comandos del sistema operativo en lib/NSSDropoff.php en ZendTo 5.24-3 a 6.x anterior a 6.10-7 permite a atacantes remotos no autenticados ejecutar comandos arbitrarios a través de metacaracteres de shell en el parámetro tmp_name al dejar un archivo mediante una solicitud POST /dropoff.

05 Apr 2025, 06:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 10.0
CWE CWE-78

05 Apr 2025, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-05 05:15

Updated : 2025-04-07 17:15


NVD link : CVE-2021-47667

Mitre link : CVE-2021-47667

CVE.ORG link : CVE-2021-47667


JSON object : View

Products Affected

No product.

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')