CVE-2020-26124

openmediavault before 4.1.36 and 5.x before 5.5.12 allows authenticated PHP code injection attacks, via the sortfield POST parameter of rpc.php, because json_encode_safe is not used in config/databasebackend.inc. Successful exploitation allows arbitrary command execution on the underlying operating system as root.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openmediavault:openmediavault:*:*:*:*:*:*:*:*
cpe:2.3:a:openmediavault:openmediavault:*:*:*:*:*:*:*:*

History

06 Jan 2022, 14:18

Type Values Removed Values Added
References (MISC) http://packetstormsecurity.com/files/160223/OpenMediaVault-rpc.php-Authenticated-PHP-Code-Injection.html - (MISC) http://packetstormsecurity.com/files/160223/OpenMediaVault-rpc.php-Authenticated-PHP-Code-Injection.html - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2020-10-02 09:15

Updated : 2024-02-04 21:23


NVD link : CVE-2020-26124

Mitre link : CVE-2020-26124

CVE.ORG link : CVE-2020-26124


JSON object : View

Products Affected

openmediavault

  • openmediavault
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')