{"containers":{"cna":{"affected":[{"product":"Iomega StorCenter","vendor":"Lenovo Group LTD","versions":[{"lessThanOrEqual":"4.1.402.34662","status":"affected","version":"4.1.402.34662","versionType":"custom"}]},{"product":"LenovoEMC","vendor":"Lenovo Group LTD","versions":[{"lessThanOrEqual":"4.1.402.34662","status":"affected","version":"4.1.402.34662","versionType":"custom"}]},{"product":"EZ Media and Backup Center","vendor":"Lenovo Group LTD","versions":[{"lessThanOrEqual":"4.1.402.34662","status":"affected","version":"4.1.402.34662","versionType":"custom"}]}],"datePublic":"2018-09-20T00:00:00.000Z","descriptions":[{"lang":"en","value":"For some Iomega, Lenovo, LenovoEMC NAS devices versions 4.1.402.34662 and earlier, when changing the name of a share, an attacker can craft a command injection payload using backtick \"``\" characters in the name parameter. As a result, arbitrary commands may be executed as the root user. The attack requires a value __c and iomega parameter."}],"problemTypes":[{"descriptions":[{"description":"Arbitrary Command Execution","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-09-28T19:57:01.000Z","orgId":"da227ddf-6e25-4b41-b023-0f976dcaca4b","shortName":"lenovo"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://support.lenovo.com/us/en/solutions/LEN-24224"}],"source":{"advisory":"https://support.lenovo.com/us/en/solutions/LEN-24224","discovery":"UNKNOWN"},"title":"Iomega and LenovoEMC NAS Web UI Vulnerabilities","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"psirt@lenovo.com","ID":"CVE-2018-9076","STATE":"PUBLIC","TITLE":"Iomega and LenovoEMC NAS Web UI Vulnerabilities"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Iomega StorCenter","version":{"version_data":[{"affected":"<=","version_affected":"<=","version_name":"4.1.402.34662","version_value":"4.1.402.34662"}]}},{"product_name":"LenovoEMC","version":{"version_data":[{"affected":"<=","version_affected":"<=","version_name":"4.1.402.34662","version_value":"4.1.402.34662"}]}},{"product_name":"EZ Media and Backup Center","version":{"version_data":[{"affected":"<=","version_affected":"<=","version_name":"4.1.402.34662","version_value":"4.1.402.34662"}]}}]},"vendor_name":"Lenovo Group LTD"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"For some Iomega, Lenovo, LenovoEMC NAS devices versions 4.1.402.34662 and earlier, when changing the name of a share, an attacker can craft a command injection payload using backtick \"``\" characters in the name parameter. As a result, arbitrary commands may be executed as the root user. The attack requires a value __c and iomega parameter."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Arbitrary Command Execution"}]}]},"references":{"reference_data":[{"name":"https://support.lenovo.com/us/en/solutions/LEN-24224","refsource":"CONFIRM","url":"https://support.lenovo.com/us/en/solutions/LEN-24224"}]},"source":{"advisory":"https://support.lenovo.com/us/en/solutions/LEN-24224","discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T07:17:50.595Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://support.lenovo.com/us/en/solutions/LEN-24224"}]}]},"cveMetadata":{"assignerOrgId":"da227ddf-6e25-4b41-b023-0f976dcaca4b","assignerShortName":"lenovo","cveId":"CVE-2018-9076","datePublished":"2018-09-28T20:00:00.000Z","dateReserved":"2018-03-27T00:00:00.000Z","dateUpdated":"2024-08-05T07:17:50.595Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}