{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-4364","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","dateUpdated":"2025-10-15T13:18:53.461Z","dateReserved":"2022-12-08T00:00:00.000Z","datePublished":"2022-12-08T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-10-15T13:18:53.461Z"},"title":"Teledyne FLIR AX8 Web Service palette.php command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"Teledyne FLIR","product":"AX8","versions":[{"version":"1.46.0","status":"affected"},{"version":"1.46.1","status":"affected"},{"version":"1.46.2","status":"affected"},{"version":"1.46.3","status":"affected"},{"version":"1.46.4","status":"affected"},{"version":"1.46.5","status":"affected"},{"version":"1.46.6","status":"affected"},{"version":"1.46.7","status":"affected"},{"version":"1.46.8","status":"affected"},{"version":"1.46.9","status":"affected"},{"version":"1.46.10","status":"affected"},{"version":"1.46.11","status":"affected"},{"version":"1.46.12","status":"affected"},{"version":"1.46.13","status":"affected"},{"version":"1.46.14","status":"affected"},{"version":"1.46.15","status":"affected"},{"version":"1.46.16","status":"affected"},{"version":"1.49.16","status":"unaffected"}],"modules":["Web Service Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in Teledyne FLIR AX8 up to 1.46.16. Affected by this issue is some unknown functionality of the file palette.php of the component Web Service Handler. The manipulation of the argument palette leads to command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.49.16 can resolve this issue. Upgrading the affected component is advised. The vendor points out: \"FLIR AX8 internal web site has been refactored to be able to handle the reported vulnerabilities.\""},{"lang":"de","value":"In Teledyne FLIR AX8 up to 1.46.16 wurde eine Schwachstelle gefunden. Es betrifft eine unbekannte Funktion der Datei palette.php der Komponente Web Service Handler. Durch Manipulieren des Arguments palette mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Der Angriff kann remote ausgeführt werden. Der Exploit ist öffentlich verfügbar und könnte genutzt werden. Ein Aktualisieren auf die Version 1.49.16 vermag dieses Problem zu lösen. Ein Upgrade der betroffenen Komponente wird empfohlen."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2022-12-08T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2022-12-08T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2022-12-08T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-10-15T15:23:31.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"ireading (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.215118","name":"VDB-215118 | Teledyne FLIR AX8 Web Service palette.php command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.215118","name":"VDB-215118 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.55748","name":"Submit #55748 | FLIR-AX8 palette.php command execution vulnerability","tags":["third-party-advisory"]},{"url":"https://github.com/siriuswhiter/VulnHub/blob/main/Flir/02-FLIR-AX8%20palette.php%20%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E/FLIR-AX8%20palette.php%20%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E1.md","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:34:50.195Z"},"title":"CVE Program Container","references":[{"url":"https://github.com/siriuswhiter/VulnHub/blob/main/Flir/02-FLIR-AX8%20palette.php%20%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E/FLIR-AX8%20palette.php%20%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E1.md","tags":["x_transferred"]},{"url":"https://vuldb.com/?id.215118","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-14T15:53:40.576104Z","id":"CVE-2022-4364","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-14T15:55:15.816Z"}}]}}