CVE-2018-20487

An issue was discovered in the firewall3 component in Inteno IOPSYS 1.0 through 3.16. The attacker must make a JSON-RPC method call to add a firewall rule as an "include" and point the "path" argument to a malicious script or binary. This gets executed as root when the firewall changes are committed.
Configurations

Configuration 1 (hide)

cpe:2.3:a:inteno:iopsys:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:01

Type Values Removed Values Added
References () http://public.inteno.se/?p=feed-inteno-openwrt.git%3Ba=commit%3Bh=e6159ca928d7f0c143be213afc6bf810c0329fe2 - () http://public.inteno.se/?p=feed-inteno-openwrt.git%3Ba=commit%3Bh=e6159ca928d7f0c143be213afc6bf810c0329fe2 -
References () https://neonsea.uk/blog/2018/12/26/firewall-includes.html - Exploit, Third Party Advisory () https://neonsea.uk/blog/2018/12/26/firewall-includes.html - Exploit, Third Party Advisory

Information

Published : 2019-04-11 21:29

Updated : 2024-11-21 04:01


NVD link : CVE-2018-20487

Mitre link : CVE-2018-20487

CVE.ORG link : CVE-2018-20487


JSON object : View

Products Affected

inteno

  • iopsys
CWE
CWE-20

Improper Input Validation