Vulnerability Details : CVE-2020-36642
A vulnerability was found in trampgeek jobe up to 1.6.x and classified as critical. This issue affects the function run_in_sandbox of the file application/libraries/LanguageTask.php. The manipulation leads to command injection. Upgrading to version 1.7.0 is able to address this issue. The identifier of the patch is 8f43daf50c943b98eaf0c542da901a4a16e85b02. It is recommended to upgrade the affected component. The identifier VDB-217553 was assigned to this vulnerability.
Products affected by CVE-2020-36642
- cpe:2.3:a:jobe_project:jobe:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-36642
0.20%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 57 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-36642
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.2
|
MEDIUM | AV:A/AC:L/Au:S/C:P/I:P/A:P |
5.1
|
6.4
|
VulDB | |
5.5
|
MEDIUM | CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
2.1
|
3.4
|
VulDB | |
5.5
|
MEDIUM | CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
2.1
|
3.4
|
VulDB | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2020-36642
-
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.Assigned by: cna@vuldb.com (Primary)
References for CVE-2020-36642
-
https://github.com/trampgeek/jobe/releases/tag/v1.7.0
Release v1.7.0: Document improvements to testsubmit.py and incorporate some sample · trampgeek/jobe · GitHubRelease Notes
-
https://github.com/trampgeek/jobe/issues/39
Privilege escalation using cputime parameter and runguard · Issue #39 · trampgeek/jobe · GitHubIssue Tracking;Third Party Advisory
-
https://vuldb.com/?ctiid.217553
Permissions Required;Third Party Advisory
-
https://github.com/trampgeek/jobe/commit/8f43daf50c943b98eaf0c542da901a4a16e85b02
Prevent command injection attacks via the cputime parameter. Fixes · trampgeek/jobe@8f43daf · GitHubPatch
-
https://vuldb.com/?id.217553
Permissions Required;Third Party Advisory
Jump to