Vulnerability Details : CVE-2020-7863
A vulnerability in File Transfer Solution of Raonwiz could allow arbitrary command execution as the result of viewing a specially-crafted web page. This vulnerability is due to insufficient validation of the parameter of the specific method. An attacker could exploit this vulnerability by setting the parameter to the command they want to execute. A successful exploit could allow the attacker to execute arbitrary commands on a target system as the user. However, the victim must run the Internet Explorer browser with administrator privileges because of the cross-domain policy.
Vulnerability category: Input validation
Products affected by CVE-2020-7863
- cpe:2.3:a:raonwiz:raon_k_upload:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-7863
0.49%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 76 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-7863
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
KrCERT/CC |
CWE ids for CVE-2020-7863
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by:
- nvd@nist.gov (Primary)
- vuln@krcert.or.kr (Secondary)
References for CVE-2020-7863
-
http://www.raonk.com/page/customs/modify.aspx?pSeq=20&pageno=1
프리미엄 하이브리드 솔루션 RAON KVendor Advisory
-
https://boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36166
KrCERT/CC - KISA 인터넷 보호나라&KrCERTThird Party Advisory
Jump to