CVE-2020-22000

Beschreibung:
HomeAutomation 3.3.2 suffers from an authenticated OS command execution vulnerability using custom command v0.1 plugin. This can be exploited with a CSRF vulnerability to execute arbitrary shell commands as the web user via the ’set_command_on‘ and ’set_command_off‘ POST parameters in ‚/system/systemplugins/customcommand/customcommand.plugin.php‘ by using an unsanitized PHP exec() function.

CWE: CWE-352 CWE-78

CVSS-Bewertung
CVSS 2: HIGH – 8.5 (Version: 2.0)
CVSS 3: HIGH – 8 (Version: 3.1)

Links:

NVD – CVE-2020-22000
CVE – CVE-2020-22000

Link (max. 20) Quelle Tags
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5560.php MISC Exploit Third Party Advisory VDB Entry
Exploit Database EXPLOIT-DB Exploit Third Party Advisory VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-21-491/ MISC Third Party Advisory VDB Entry Vendor Advisory
[oss-security] 20210427 [CVE-2021-29200] RCE vulnerability in latest Apache OFBiz due to Java serialisation using RMI MLIST Mailing List Patch Third Party Advisory
[ofbiz-dev] 20210427 [CVE-2021-29200] RCE vulnerability in latest Apache OFBiz due to Java serialisation using RMI MLIST Mailing List Vendor Advisory Vendor Advisory
[ofbiz-commits] 20210427 [ofbiz-site] branch master updated: Updates security page for CVE-2021-29200 and 30128 fixed in 17.12.07 MLIST Mailing List Patch Vendor Advisory
[announce] 20210427 [CVE-2021-29200] RCE vulnerability in latest Apache OFBiz due to Java serialisation using RMI MLIST Mailing List Vendor Advisory Vendor Advisory
[announce] 20210427 [CVE-2021-30128] Unsafe deserialization in OFBiz MLIST Mailing List Mitigation Vendor Advisory

Quelle: NVD – CVE-2020-22000
Datum Veröffentlichung: 2021-04-27T18:15Z, Datum letzte Änderung: 2021-05-06T14:05Z