Vulnerability Details : CVE-2020-5849
Public exploit exists!
Unraid 6.8.0 allows authentication bypass.
Vulnerability category: BypassGain privilege
Products affected by CVE-2020-5849
- cpe:2.3:a:unraid:unraid:6.8.0:*:*:*:*:*:*:*
CVE-2020-5849 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Unraid Authentication Bypass Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Unraid contains an authentication bypass vulnerability that allows attackers to gain access to the administrative interface. This CVE is chainable with CVE-2020-5847 for remote code execution.
Notes:
https://nvd.nist.gov/vuln/detail/CVE-2020-5849
Added on
2021-11-03
Action due date
2022-05-03
Exploit prediction scoring system (EPSS) score for CVE-2020-5849
97.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2020-5849
-
Unraid 6.8.0 Auth Bypass PHP Code Execution
Disclosure Date: 2020-02-10First seen: 2020-04-26exploit/linux/http/unraid_auth_bypass_execThis module exploits two vulnerabilities affecting Unraid 6.8.0. An authentication bypass is used to gain access to the administrative interface, and an insecure use of the extract PHP function can be abused for arbitrary code execution as root. Auth
CVSS scores for CVE-2020-5849
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2020-5849
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
-
The product compares two entities in a security-relevant context, but the comparison is incorrect, which may lead to resultant weaknesses.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-5849
-
https://sysdream.com/news/lab/
Sysdream, Le lab'Third Party Advisory
-
https://forums.unraid.net/forum/7-announcements/
Announcements - UnraidRelease Notes;Vendor Advisory
-
https://sysdream.com/news/lab/2020-02-06-cve-2020-5847-cve-2020-5849-unraid-6-8-0-unauthenticated-remote-code-execution-as-root/
Sysdream, [CVE-2020-5847 / CVE-2020-5849] Unraid 6.8.0 Unauthenticated Remote Code Execution as rootExploit;Third Party Advisory
-
http://packetstormsecurity.com/files/157275/Unraid-6.8.0-Authentication-Bypass-Arbitrary-Code-Execution.html
Unraid 6.8.0 Authentication Bypass / Arbitrary Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
Jump to