Learn about CVE-2017-6087, a vulnerability in EyesOfNetwork version 5.0 and earlier that allows authenticated remote users to execute unauthorized code. Find mitigation steps and prevention measures here.
EyesOfNetwork version 5.0 and previous versions have a vulnerability that allows authenticated remote users to run unauthorized code by exploiting specific parameters in certain files.
Understanding CVE-2017-6087
This CVE involves a remote code execution vulnerability in EyesOfNetwork version 5.0 and earlier.
What is CVE-2017-6087?
EyesOfNetwork (EON) 5.0 and earlier versions are susceptible to remote code execution by authenticated users through specific parameters in certain files.
The Impact of CVE-2017-6087
The vulnerability allows authenticated remote users to execute unauthorized code, posing a significant security risk to affected systems.
Technical Details of CVE-2017-6087
This section provides detailed technical information about the CVE.
Vulnerability Description
The vulnerability in EyesOfNetwork version 5.0 and earlier enables authenticated remote users to execute arbitrary code by manipulating specific parameters in certain files.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by using shell metacharacters in the selected_events[] parameter in the acknowledge, delete, or ownDisown function in the ged_functions.php file or by utilizing the module parameter in the index.php file.
Mitigation and Prevention
Protecting systems from CVE-2017-6087 requires immediate actions and long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates