Supervisor.XML-RPC.Authenticated.Remote.Code.Execution
Description
This indicates an attack attempt to exploit a Code Execution vulnerability in Supervisor process control software.
The vulnerability is due to an input validation error while parsing a crafted HTTP request. A remote attacker could exploit this to execute arbitrary code within the context of the target application, via a crafted HTTP request.
Valid login authentication is required to exploit this vulnerability.
Affected Products
Supervisor version 3.0 and prior
Supervisor version 3.1.3 and prior
Supervisor version 3.2.3 and prior
Supervisor version 3.3.2 and prior
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://github.com/Supervisor/supervisor/issues/964
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |