CVE-2020-7863

A vulnerability in File Transfer Solution of Raonwiz could allow arbitrary command execution as the result of viewing a specially-crafted web page. This vulnerability is due to insufficient validation of the parameter of the specific method. An attacker could exploit this vulnerability by setting the parameter to the command they want to execute. A successful exploit could allow the attacker to execute arbitrary commands on a target system as the user. However, the victim must run the Internet Explorer browser with administrator privileges because of the cross-domain policy.
Configurations

Configuration 1 (hide)

cpe:2.3:a:raonwiz:raon_k_upload:*:*:*:*:*:*:*:*

History

13 Aug 2021, 13:44

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 9.3
v3 : 8.8
References (MISC) https://boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36166 - (MISC) https://boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36166 - Third Party Advisory
References (MISC) http://www.raonk.com/page/customs/modify.aspx?pSeq=20&pageno=1 - (MISC) http://www.raonk.com/page/customs/modify.aspx?pSeq=20&pageno=1 - Vendor Advisory
CPE cpe:2.3:a:raonwiz:raon_k_upload:*:*:*:*:*:*:*:*
CWE CWE-20

05 Aug 2021, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-08-05 21:15

Updated : 2024-02-04 21:47


NVD link : CVE-2020-7863

Mitre link : CVE-2020-7863

CVE.ORG link : CVE-2020-7863


JSON object : View

Products Affected

raonwiz

  • raon_k_upload
CWE
CWE-20

Improper Input Validation