Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-6087 : Vulnerability Insights and Analysis

Learn about CVE-2017-6087, a vulnerability in EyesOfNetwork version 5.0 and earlier that allows authenticated remote users to execute unauthorized code. Find mitigation steps and prevention measures here.

EyesOfNetwork version 5.0 and previous versions have a vulnerability that allows authenticated remote users to run unauthorized code by exploiting specific parameters in certain files.

Understanding CVE-2017-6087

This CVE involves a remote code execution vulnerability in EyesOfNetwork version 5.0 and earlier.

What is CVE-2017-6087?

EyesOfNetwork (EON) 5.0 and earlier versions are susceptible to remote code execution by authenticated users through specific parameters in certain files.

The Impact of CVE-2017-6087

The vulnerability allows authenticated remote users to execute unauthorized code, posing a significant security risk to affected systems.

Technical Details of CVE-2017-6087

This section provides detailed technical information about the CVE.

Vulnerability Description

The vulnerability in EyesOfNetwork version 5.0 and earlier enables authenticated remote users to execute arbitrary code by manipulating specific parameters in certain files.

Affected Systems and Versions

        Product: EyesOfNetwork
        Vendor: N/A
        Versions affected: 5.0 and earlier

Exploitation Mechanism

The vulnerability can be exploited by using shell metacharacters in the selected_events[] parameter in the acknowledge, delete, or ownDisown function in the ged_functions.php file or by utilizing the module parameter in the index.php file.

Mitigation and Prevention

Protecting systems from CVE-2017-6087 requires immediate actions and long-term security practices.

Immediate Steps to Take

        Update EyesOfNetwork to a patched version or apply security fixes provided by the vendor.
        Monitor and restrict access to the vulnerable files and parameters.

Long-Term Security Practices

        Regularly update and patch software to address known vulnerabilities.
        Implement strong authentication mechanisms to prevent unauthorized access.
        Conduct security audits and penetration testing to identify and mitigate potential risks.

Patching and Updates

        Stay informed about security updates and patches released by EyesOfNetwork.
        Apply patches promptly to ensure the system is protected against known vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now