7.8

CVE-2023-42136

Exploit
PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow the execution of arbitrary commands with system account privilege by shell injection starting with a specific word.




The attacker must have shell access to the device in order to exploit this vulnerability.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
PaxtechnologyPaydroid Version <= 8.1.0_sagittarius_11.1.50_20230614
   PaxtechnologyA50 Version-
PaxtechnologyPaydroid Version <= 8.1.0_sagittarius_11.1.50_20230614
   PaxtechnologyA6650 Version-
PaxtechnologyPaydroid Version <= 8.1.0_sagittarius_11.1.50_20230614
   PaxtechnologyA800 Version-
PaxtechnologyPaydroid Version <= 8.1.0_sagittarius_11.1.50_20230614
   PaxtechnologyA77 Version-
PaxtechnologyPaydroid Version <= 8.1.0_sagittarius_11.1.50_20230614
   PaxtechnologyA920 Version-
PaxtechnologyPaydroid Version <= 8.1.0_sagittarius_11.1.50_20230614
   PaxtechnologyA920 Pro Version-
PaxtechnologyPaydroid Version <= 8.1.0_sagittarius_11.1.50_20230614
   PaxtechnologyA920 Max Version-
PaxtechnologyPaydroid Version <= 8.1.0_sagittarius_11.1.50_20230614
   PaxtechnologyD190 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.08% 0.237
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvd@cert.pl 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')

The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.