Vulnerability Details CVE-2017-1000009
Akeneo PIM CE and EE <1.6.6, <1.5.15, <1.4.28 are vulnerable to shell injection in the mass edition, resulting in remote execution.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.111
EPSS Ranking 93.2%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2017-1000009
-
cpe:2.3:a:akeneo:product_information_management:1.4.0
-
cpe:2.3:a:akeneo:product_information_management:1.4.1
-
cpe:2.3:a:akeneo:product_information_management:1.4.10
-
cpe:2.3:a:akeneo:product_information_management:1.4.11
-
cpe:2.3:a:akeneo:product_information_management:1.4.12
-
cpe:2.3:a:akeneo:product_information_management:1.4.13
-
cpe:2.3:a:akeneo:product_information_management:1.4.14
-
cpe:2.3:a:akeneo:product_information_management:1.4.15
-
cpe:2.3:a:akeneo:product_information_management:1.4.16
-
cpe:2.3:a:akeneo:product_information_management:1.4.17
-
cpe:2.3:a:akeneo:product_information_management:1.4.18
-
cpe:2.3:a:akeneo:product_information_management:1.4.19
-
cpe:2.3:a:akeneo:product_information_management:1.4.2
-
cpe:2.3:a:akeneo:product_information_management:1.4.20
-
cpe:2.3:a:akeneo:product_information_management:1.4.21
-
cpe:2.3:a:akeneo:product_information_management:1.4.22
-
cpe:2.3:a:akeneo:product_information_management:1.4.23
-
cpe:2.3:a:akeneo:product_information_management:1.4.24
-
cpe:2.3:a:akeneo:product_information_management:1.4.25
-
cpe:2.3:a:akeneo:product_information_management:1.4.26
-
cpe:2.3:a:akeneo:product_information_management:1.4.27
-
cpe:2.3:a:akeneo:product_information_management:1.4.3
-
cpe:2.3:a:akeneo:product_information_management:1.4.4
-
cpe:2.3:a:akeneo:product_information_management:1.4.5
-
cpe:2.3:a:akeneo:product_information_management:1.4.6
-
cpe:2.3:a:akeneo:product_information_management:1.4.7
-
cpe:2.3:a:akeneo:product_information_management:1.4.8
-
cpe:2.3:a:akeneo:product_information_management:1.4.9
-
cpe:2.3:a:akeneo:product_information_management:1.5.0
-
cpe:2.3:a:akeneo:product_information_management:1.5.1
-
cpe:2.3:a:akeneo:product_information_management:1.5.10
-
cpe:2.3:a:akeneo:product_information_management:1.5.11
-
cpe:2.3:a:akeneo:product_information_management:1.5.12
-
cpe:2.3:a:akeneo:product_information_management:1.5.13
-
cpe:2.3:a:akeneo:product_information_management:1.5.14
-
cpe:2.3:a:akeneo:product_information_management:1.5.2
-
cpe:2.3:a:akeneo:product_information_management:1.5.3
-
cpe:2.3:a:akeneo:product_information_management:1.5.4
-
cpe:2.3:a:akeneo:product_information_management:1.5.5
-
cpe:2.3:a:akeneo:product_information_management:1.5.6
-
cpe:2.3:a:akeneo:product_information_management:1.5.7
-
cpe:2.3:a:akeneo:product_information_management:1.5.8
-
cpe:2.3:a:akeneo:product_information_management:1.5.9
-
cpe:2.3:a:akeneo:product_information_management:1.6.0
-
cpe:2.3:a:akeneo:product_information_management:1.6.1
-
cpe:2.3:a:akeneo:product_information_management:1.6.2
-
cpe:2.3:a:akeneo:product_information_management:1.6.3
-
cpe:2.3:a:akeneo:product_information_management:1.6.4
-
cpe:2.3:a:akeneo:product_information_management:1.6.5