An input validation weakness was discovered in XCC that...
High severity
Unreviewed
Published
Sep 13, 2024
to the GitHub Advisory Database
•
Updated Sep 13, 2024
Description
Published by the National Vulnerability Database
Sep 13, 2024
Published to the GitHub Advisory Database
Sep 13, 2024
Last updated
Sep 13, 2024
An input validation weakness was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection through specially crafted command line input in the XCC SSH captive shell.
References