Gibbon.Edu.rubrics_visualise_saveAjax.php.Command.Injection
Description
This indicates an attack attempt to exploit a Command Injection vulnerability in Gibbon Edu.
The vulnerability is due to insufficient sanitizing of user-supplied inputs in the application. A remote unauthenticated attacker may be able to exploit this to execute arbitrary commands within the context of the system.
Affected Products
Gibbon 25.0.01
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Currently, we are unaware of any vendor-supplied patch or updates available for this issue.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |