Vulnerability Details : CVE-2020-5632
InfoCage SiteShell series (Host type SiteShell for IIS V1.4, V1.5, and V1.6, Host type SiteShell for IIS prior to revision V2.0.0.6, V2.1.0.7, V2.1.1.6, V3.0.0.11, V4.0.0.6, V4.1.0.5, and V4.2.0.1, Host type SiteShell for Apache Windows V1.4, V1.5, and V1.6, and Host type SiteShell for Apache Windows prior to revision V2.0.0.6, V2.1.0.7, V2.1.1.6, V3.0.0.11, V4.0.0.6, V4.1.0.5, and V4.2.0.1) allow authenticated attackers to bypass access restriction and to execute arbitrary code with an elevated privilege via a specially crafted executable files.
Vulnerability category: Execute code
Products affected by CVE-2020-5632
- cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:iis:*:*
- NEC » Infocage Siteshell » For Apache WindowsVersions from including (>=) 4.1.0.0 and before (<) 4.1.0.5cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:apache_windows:*:*
- NEC » Infocage Siteshell » For Apache WindowsVersions from including (>=) 4.0.0.0 and before (<) 4.0.0.6cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:apache_windows:*:*
- cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:iis:*:*
- cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:iis:*:*
- NEC » Infocage Siteshell » For Apache WindowsVersions from including (>=) 2.1.0.0 and before (<) 2.1.0.7cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:apache_windows:*:*
- NEC » Infocage Siteshell » For Apache WindowsVersions from including (>=) 2.1.1.0 and before (<) 2.1.1.6cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:apache_windows:*:*
- NEC » Infocage Siteshell » For Apache WindowsVersions from including (>=) 3.0.0.0 and before (<) 3.0.0.11cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:apache_windows:*:*
- cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:apache_windows:*:*
- NEC » Infocage Siteshell » For Apache WindowsVersions from including (>=) 4.2.0.0 and before (<) 4.2.0.1cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:apache_windows:*:*
- cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:iis:*:*
- cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:iis:*:*
- cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:iis:*:*
- cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:iis:*:*
- cpe:2.3:a:nec:infocage_siteshell:1.4:*:*:*:*:apache_windows:*:*
- cpe:2.3:a:nec:infocage_siteshell:1.4:*:*:*:*:iis:*:*
- cpe:2.3:a:nec:infocage_siteshell:1.5:*:*:*:*:apache_windows:*:*
- cpe:2.3:a:nec:infocage_siteshell:1.5:*:*:*:*:iis:*:*
- cpe:2.3:a:nec:infocage_siteshell:1.6:*:*:*:*:apache_windows:*:*
- cpe:2.3:a:nec:infocage_siteshell:1.6:*:*:*:*:iis:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-5632
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 10 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-5632
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
References for CVE-2020-5632
-
https://jpn.nec.com/infocage/siteshell/everyone_20200918.html
インストールしたファイルに Everyone による変更権限が付与される際のInfoCage SiteShellの対応について: Webアプリケーションファイアウォール(WAF) InfoCage SiteShell | NECVendor Advisory
-
https://jvn.jp/en/jp/JVN07426151/index.html
JVN#07426151: InfoCage SiteShell installs their files with improper access permissionsThird Party Advisory
Jump to