Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

How a hardware wallet protects your private key: Security and safety instructions

Cartoonist Paul Pope is more worried about killer robots than AI plagiarism

Review Week: Meta reveals Oakley Smart Glasses

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » A flaw in the critical Commvault command center allows attackers to execute code remotely
Identity

A flaw in the critical Commvault command center allows attackers to execute code remotely

userBy userApril 24, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 24, 2025Ravi LakshmananData Breaches/Vulnerabilities

Commvault Command Center defects

The Commvault Command Center discloses important security flaws that allow arbitrary code execution in affected installations.

The vulnerability tracked as CVE-2025-34028 carries a CVSS score of up to 9.0 out of 10.0.

“A critical security vulnerability has been identified in the Command Center installation, allowing remote attackers to execute arbitrary code without authentication,” Commvault said in an advisory published on April 17, 2025.

Cybersecurity

It affected versions 11.38.0 to 11.38.19 to 11.38 innovation releases and was resolved in the next version –

Sonny MacDonald, a researcher at Watchtowr Labs, who was recognized as discovering and reporting the defect on April 7, 2025, said in a report shared by hacker news and that it could be exploited to achieve pre-recognized remote code execution.

Specifically, this issue is rooted in an endpoint called “deploywebpackage.do” and triggers what is called pre-accepted server-side request forgery (SSRF) due to the fact that “there is no filtering about how the host can communicate with.”

Worse, code execution can be achieved by escalating the flaws in SSRF to use a ZIP archive file containing malicious .JSP files. The entire sequence of events is:

When you send an http request to /commandcenter/deploywebpackage.do, the commvault instance will retrieve the zip file from the contents of the external server in the zip file. Run the shell from /reports/metricsupload/shell/CommandCenter/DeployWebPackage.do SSRF to run the shell from /reports/metricsupload/shell/.tmp/dist-cc/dist-cc/shell.jsp

Cybersecurity

WatchTowr has created a detection artifact generator that organizations can use to determine if an instance is vulnerable to a vulnerability.

With vulnerabilities in backup and replication software such as Veeam and Nakivo undergoing active exploitation in the wild, it is essential for users to apply the mitigation they need to prevent potential threats.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous Article159 CVEs misappropriated in Q1 2025 – 28.3% within 24 hours of disclosure
Next Article ‘Insult’: Hamas condemns Abbas’ comments about Gaza prisoners of war News between Israel and Palestinian conflict
user
  • Website

Related Posts

Spiders scattered behind M&S and cooperative cyberattacks, with up to $592 million in damages

June 21, 2025

Qilin ransomware adds “Cole Lawyer” feature that puts pressure on victims for larger ransoms

June 20, 2025

Television in Iranian states hijacked mid-distance broadcasts amid geopolitical tensions. $90 million stolen from Crypto Heist

June 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

How a hardware wallet protects your private key: Security and safety instructions

Cartoonist Paul Pope is more worried about killer robots than AI plagiarism

Review Week: Meta reveals Oakley Smart Glasses

Spiders scattered behind M&S and cooperative cyberattacks, with up to $592 million in damages

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

How a hardware wallet protects your private key: Security and safety instructions

Top Startups and High-Tech Funding News for the Weekly Ends June 20, 2025

Apple is talking to you to win AI startup confusion

Mira Murati’s AI Startup Thinking Machine Lab emerges from stealth at $20 billion seed and $1 billion valuation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.