Vulnerability Details : CVE-2020-10511
HGiga C&Cmail CCMAILQ before olln-base-6.0-418.i386.rpm and CCMAILN before olln-base-5.0-418.i386.rpm contains insecure configurations. Attackers can exploit these flaws to access unauthorized functionality via a crafted URL.
Products affected by CVE-2020-10511
- cpe:2.3:a:hgiga:oaklouds_ccm\@il:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-10511
0.35%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 71 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-10511
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
TWCERT/CC |
CWE ids for CVE-2020-10511
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-10511
-
https://gist.github.com/tonykuo76/7d41c414f23ef1e47c97f7b97e1b33b0
HGiga C&Cmail Privilege Escalation leads to OS Command Injection.md · GitHubThird Party Advisory
-
https://www.twcert.org.tw/tw/cp-132-3535-e40ec-1.html
TWCERT/CC台灣電腦網路危機處理暨協調中心-資安服務-台灣漏洞揭露平台 (TVN)-TVN (Taiwan Vulnerability Note) 漏洞公告-HGiga C&Cmail - Broken Access ControlThird Party Advisory
-
https://www.chtsecurity.com/news/19400b04-ea92-4eaa-afa7-2449fd9b2e0b
CVE-2020-10511|中華資安國際 CHT Security Co., Ltd.Third Party Advisory
Jump to