Vulnerability CVE-2020-16152


Published: 2021-11-14

Description:
The NetConfig UI administrative interface in Extreme Networks ExtremeWireless Aerohive HiveOS and IQ Engine through 10.0r8a allows attackers to execute PHP code as the root user via remote HTTP requests that insert this code into a log file and then traverse to that file.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Aerohive NetConfig 10.0r8a Local File Inclusion / Remote Code Execution
Erik Wynter
14.11.2021

Type:

CWE-829

(Inclusion of Functionality from Untrusted Control Sphere)

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Extremenetworks -> Aerohive netconfig 

 References:
http://packetstormsecurity.com/files/164957/Aerohive-NetConfig-10.0r8a-Local-File-Inclusion-Remote-Code-Execution.html
https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2020-001

Copyright 2024, cxsecurity.com

 

Back to Top