| |
Vulnerability CVE-2020-7357
Published: 2020-08-06
Description: |
Cayin CMS suffers from an authenticated OS semi-blind command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user through the 'NTP_Server_IP' HTTP POST parameter in system.cgi page. This issue affects several branches and versions of the CMS application, including CME-SE, CMS-60, CMS-40, CMS-20, and CMS version 8.2, 8.0, and 7.5. |
Type:
CWE-78 (Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
)
CVSS2 => (AV:N/AC:L/Au:S/C:C/I:C/A:C)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
9/10 |
10/10 |
8/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Low |
Single time |
Confidentiality impact |
Integrity impact |
Availability impact |
Complete |
Complete |
Complete |
References: |
https://exchange.xforce.ibmcloud.com/vulnerabilities/182925
https://github.com/rapid7/metasploit-framework/pull/13607
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5570.php
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|