Klog Server Unauthenticated Command Injection

By
Manieendar Mohan
Published on
15 Jun 2021

In KLog Server 2.4.1, the actions/authenticate.php user parameter allows OS command injection through shell metacharacters. If this vulnerability is successfully exploited, a remote attacker may be able to execute arbitrary commands on the affected system.

Mitigation / Precaution

  • In order to patch this vulnerability, please install the official patch made by the vendor available for supported, vulnerable instances.
Automated human-like penetration testing for your web apps & APIs
Teams using Beagle Security are set up in minutes, embrace release-based CI/CD security testing and save up to 65% with timely remediation of vulnerabilities. Sign up for a free account to see what it can do for you.

Written by
Manieendar Mohan
Manieendar Mohan
Cyber Security Lead Engineer
Find website security issues in a flash
Improve your website's security posture with proactive vulnerability detection.
Free website security assessment
Experience the power of automated penetration testing & contextual reporting.