Vulnerability Details : CVE-2020-8816
Public exploit exists!
Pi-hole Web v4.3.2 (aka AdminLTE) allows Remote Code Execution by privileged dashboard users via a crafted DHCP static lease.
Vulnerability category: Execute code
Products affected by CVE-2020-8816
- cpe:2.3:a:pi-hole:pi-hole:*:*:*:*:*:*:*:*
Threat overview for CVE-2020-8816
Top countries where our scanners detected CVE-2020-8816
Top open port discovered on systems with this issue
22
IPs affected by CVE-2020-8816 1
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2020-8816!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
CVE-2020-8816 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Pi-Hole AdminLTE Remote Code Execution Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Pi-hole Web v4.3.2 (aka AdminLTE) allows Remote Code Execution by privileged dashboard users via a crafted DHCP static lease.
Notes:
https://nvd.nist.gov/vuln/detail/CVE-2020-8816
Added on
2021-12-10
Action due date
2022-06-10
Exploit prediction scoring system (EPSS) score for CVE-2020-8816
96.74%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2020-8816
-
Pi-Hole DHCP MAC OS Command Execution
Disclosure Date: 2020-03-28First seen: 2020-05-28exploit/unix/http/pihole_dhcp_mac_execThis exploits a command execution in Pi-Hole <= 4.3.2. A new DHCP static lease is added with a MAC address which includes an RCE. Exploitation requires /opt/pihole to be first in the $PATH due to exploitation constraints. DHCP server is not required to be running.
CVSS scores for CVE-2020-8816
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
9.1
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
2.3
|
6.0
|
MITRE | |
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
NIST |
CWE ids for CVE-2020-8816
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2020-8816
-
https://github.com/pi-hole/AdminLTE/pull/1165
Fix potential code injection on MAC address validator by PromoFaux · Pull Request #1165 · pi-hole/AdminLTE · GitHubPatch;Third Party Advisory
-
http://packetstormsecurity.com/files/157861/Pi-Hole-4.3.2-DHCP-MAC-OS-Command-Execution.html
Pi-Hole 4.3.2 DHCP MAC OS Command Execution ≈ Packet StormThird Party Advisory;VDB Entry
-
http://packetstormsecurity.com/files/158737/Pi-hole-4.3.2-Remote-Code-Execution.html
Pi-hole 4.3.2 Remote Code Execution ≈ Packet StormThird Party Advisory;VDB Entry
-
https://natedotred.wordpress.com/2020/03/28/cve-2020-8816-pi-hole-remote-code-execution/
CVE-2020-8816 – Pi-hole Remote Code Execution – Nate's BlogExploit;Third Party Advisory
-
https://twitter.com/Nate_Kappa/status/1243900213665902592?s=20
🔜N̜̣̹͗ͬͫ͗ã͓͕͔̟̓̑̔t̺͎͕͔̂͋ͦë̙̉̽🔙 on Twitter: "I discovered and disclosed this fancy RCE: CVE-2020-8816 - Pi-hole Remote Code Execution https://t.co/Q9aPeEq8Wj https://t.co/6VLXZvi9nY" / TwitterPress/Media Coverage
-
https://github.com/pi-hole/AdminLTE/commits/master
Commits · pi-hole/AdminLTE · GitHubPatch;Third Party Advisory
-
https://github.com/pi-hole/AdminLTE/releases/tag/v4.3.3
Release Pi-hole Web version 4.3.3 · pi-hole/AdminLTE · GitHubRelease Notes;Third Party Advisory
Jump to