An issue was discovered on Spirent TestCenter and Avalanche appliance admin interface firmware. An attacker, who already has access to an SSH restricted shell, can achieve root access via shell metacharacters. The attacker can then, for example, read sensitive files such as appliance admin configuration source code. This affects Spirent TestCenter and Avalanche products which chassis version <= 5.08. The SSH restricted shell is available with default credentials.
References
Link | Resource |
---|---|
https://github.com/a05110511t/CVE/blob/master/CVE-2020-11733.md | Third Party Advisory |
https://gist.github.com/a05110511t/65d07bc776d7c11b4ccf112a09cca4ab | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2020-08-13 07:15
Updated : 2021-07-21 04:39
NVD link : CVE-2020-11733
Mitre link : CVE-2020-11733
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
spirent
- c100-mp
- avalanche
- testcenter