Vulnerability Details : CVE-2020-24572
An issue was discovered in includes/webconsole.php in RaspAP 2.5. With authenticated access, an attacker can use a misconfigured (and virtually unrestricted) web console to attack the underlying OS (Raspberry Pi) running this software, and execute commands on the system (including ones for uploading of files and execution of code).
Products affected by CVE-2020-24572
- cpe:2.3:a:raspap:raspap:2.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-24572
0.39%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 73 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-24572
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2020-24572
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-24572
-
https://github.com/billz/raspap-webgui/commit/dd5ab7bdc213381ee552001dd80c41ca47afab00
Remove webconsole, fixes RCE via json-rpc. Thanks @lb0x · billz/raspap-webgui@dd5ab7b · GitHubPatch;Third Party Advisory
-
https://github.com/lb0x
lb0x (lunchb0x) · GitHubThird Party Advisory
-
https://github.com/billz/raspap-webgui/releases
Releases · billz/raspap-webgui · GitHubRelease Notes;Third Party Advisory
-
https://deadb0x.io/lunchb0x/cve-2020-24572/
[CVE-2020-24572] Authenticated Remote Code Execution (RCE) via JSON-RPC in RaspAP v2.5 – deadbØx.ioExploit;Third Party Advisory
Jump to