openmediavault before 4.1.36 and 5.x before 5.5.12 allows authenticated PHP code injection attacks, via the sortfield POST parameter of rpc.php, because json_encode_safe is not used in config/databasebackend.inc. Successful exploitation allows arbitrary command execution on the underlying operating system as root.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/160223/OpenMediaVault-rpc.php-Authenticated-PHP-Code-Injection.html | Exploit Third Party Advisory VDB Entry |
https://github.com/openmediavault/openmediavault/commit/ebb51bbf5a39f4955eab0073bf87f2a31926d85d | Patch Third Party Advisory |
https://www.openmediavault.org/?p=2797 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
06 Jan 2022, 14:18
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://packetstormsecurity.com/files/160223/OpenMediaVault-rpc.php-Authenticated-PHP-Code-Injection.html - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2020-10-02 09:15
Updated : 2024-02-04 21:23
NVD link : CVE-2020-26124
Mitre link : CVE-2020-26124
CVE.ORG link : CVE-2020-26124
JSON object : View
Products Affected
openmediavault
- openmediavault
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')