An issue was discovered in Ozeki NG SMS Gateway through 4.17.6. It stores SMS messages in .NET serialized format on the filesystem. By generating (and writing to the disk) malicious .NET serialized files, an attacker can trick the product into deserializing them, resulting in arbitrary code execution.
References
Link | Resource |
---|---|
http://www.ozeki.hu/index.php?owpn=231 | Vendor Advisory |
https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14030-RCE%20via%20.NET%20Deserialization-Ozeki%20SMS%20Gateway | Patch Third Party Advisory |
Configurations
Information
Published : 2020-09-30 11:15
Updated : 2020-10-09 11:42
NVD link : CVE-2020-14030
Mitre link : CVE-2020-14030
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
ozeki
- ozeki_ng_sms_gateway