Overview
Autodesk VRED contains an unauthenticated remote code execution vulnerability.
Description
CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'): Autodesk VRED Professional 2014 contains an unauthenticated remote code execution vulnerability. Autodesk VRED Professional 2014 contains an integrated web server that binds to port tcp/8888 which is accessible remotely. It has been reported that this web server gives access to a Python API which provides users with a vast amount of libraries which could allow an attacker to execute operating system commands. Through this API, Python code can be executed on the target system, the output is returned in the web server response. By importing the Python “os” library, arbitrary operating system commands can be executed on the target system with the privileges of the user running VRED Professional 2014. |
Impact
An unauthenticated attacker can execute operating system commands with the privileges of the user running VRED Professional 2014. |
Solution
Apply an Update |
Restrict Access |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 10 | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Temporal | 8.3 | E:F/RL:OF/RC:C |
Environmental | 6.3 | CDP:L/TD:M/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to Thomas Fischer from Daimler TSS Technical Security for reporting this vulnerability.
This document was written by Michael Orlando.
Other Information
CVE IDs: | CVE-2014-2967 |
Date Public: | 2014-06-24 |
Date First Published: | 2014-07-03 |
Date Last Updated: | 2014-07-03 14:55 UTC |
Document Revision: | 8 |