The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade OctoPrint
to version 1.11.3 or higher.
OctoPrint is a snappy web interface for your 3D printer
Affected versions of this package are vulnerable to Command Injection due to upload file when a specially crafted filename is included in a command defined in a system event handler and the corresponding event is triggered. An attacker can execute arbitrary system commands by uploading a file with a malicious filename if event handlers are configured to use uploaded filenames as command parameters.
Note: This is only exploitable if event handlers are configured to execute system commands with uploaded filenames as parameters.
This vulnerability can be mitigated by disabling event handlers that include filename-based placeholders, or by setting feature.enforceReallyUniversalFilenames
to true
in config.yaml
and restarting the application, then reviewing and deleting any suspicious files.
via the file upload process when a specially crafted filename is included in a command defined in a system event handler and the corresponding event is triggered.