CVE-2022-2888813.07.2022, 18:15Spryker Commerce OS 1.4.2 allows Remote Command Execution.OS Command InjectionEnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTNIST9.8 CRITICALNETWORKLOWNONECVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HmitreCNA------CVEADP------Base ScoreCVSS 3.xEPSS ScorePercentile: 84%VendorProductVersionsprykercloud_commerce𝑥< 1.7.0𝑥= Vulnerable software versionsKnown Exploits!http://packetstormsecurity.com/files/167765/Spryker-Commerce-OS-Remote-Command-Execution.htmlhttps://schutzwerk.comhttps://www.schutzwerk.com/en/43/advisories/schutzwerk-sa-2022-003/http://packetstormsecurity.com/files/167765/Spryker-Commerce-OS-Remote-Command-Execution.htmlhttps://schutzwerk.comhttps://www.schutzwerk.com/en/43/advisories/schutzwerk-sa-2022-003/Common Weakness EnumerationCWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Referenceshttp://packetstormsecurity.com/files/167765/Spryker-Commerce-OS-Remote-Command-Execution.htmlhttp://packetstormsecurity.com/files/172257/Spryker-Commerce-OS-1.0-SQL-Injection.htmlhttp://seclists.org/fulldisclosure/2022/Jul/4http://seclists.org/fulldisclosure/2023/May/2https://schutzwerk.comhttps://www.schutzwerk.com/en/43/advisories/schutzwerk-sa-2022-003/http://packetstormsecurity.com/files/167765/Spryker-Commerce-OS-Remote-Command-Execution.htmlhttp://packetstormsecurity.com/files/172257/Spryker-Commerce-OS-1.0-SQL-Injection.htmlhttp://seclists.org/fulldisclosure/2022/Jul/4http://seclists.org/fulldisclosure/2023/May/2https://schutzwerk.comhttps://www.schutzwerk.com/en/43/advisories/schutzwerk-sa-2022-003/