Vulnerability Details : CVE-2020-12078
Potential exploit
An issue was discovered in Open-AudIT 3.3.1. There is shell metacharacter injection via attributes to an open-audit/configuration/ URI. An attacker can exploit this by adding an excluded IP address to the global discovery settings (internally called exclude_ip). This exclude_ip value is passed to the exec function in the discoveries_helper.php file (inside the all_ip_list function) without being filtered, which means that the attacker can provide a payload instead of a valid IP address.
Products affected by CVE-2020-12078
- cpe:2.3:a:opmantek:open-audit:3.3.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-12078
63.67%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-12078
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2020-12078
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-12078
-
https://shells.systems/open-audit-v3-3-1-remote-command-execution-cve-2020-12078/
Open-AudIT v3.3.1 Remote Command Execution (CVE-2020-12078) - Shells.SystemsExploit;Third Party Advisory
-
http://packetstormsecurity.com/files/157477/Open-AudIT-Professional-3.3.1-Remote-Code-Execution.html
Open-AudIT Professional 3.3.1 Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://github.com/Opmantek/open-audit/commit/6ffc7f9032c55eaa1c37cf5e070809b7211c7e9a
Validate correct character for subnet and exclude_ip attributes when … · Opmantek/open-audit@6ffc7f9 · GitHubPatch;Third Party Advisory
-
https://gist.github.com/mhaskar/dca62d0f0facc13f6364b8ed88d5a7fd
Open-AudIT Professional v3.3.1 Remote Code Execution · GitHubExploit;Third Party Advisory
Jump to