An issue was discovered in includes/webconsole.php in RaspAP 2.5. With authenticated access, an attacker can use a misconfigured (and virtually unrestricted) web console to attack the underlying OS (Raspberry Pi) running this software, and execute commands on the system (including ones for uploading of files and execution of code).
References
Link | Resource |
---|---|
https://github.com/billz/raspap-webgui/commit/dd5ab7bdc213381ee552001dd80c41ca47afab00 | Patch Third Party Advisory |
https://deadb0x.io/lunchb0x/cve-2020-24572/ | Exploit Third Party Advisory |
https://github.com/billz/raspap-webgui/releases | Release Notes Third Party Advisory |
https://github.com/lb0x | Third Party Advisory |
Configurations
Information
Published : 2020-08-24 13:15
Updated : 2020-09-01 12:05
NVD link : CVE-2020-24572
Mitre link : CVE-2020-24572
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
raspap
- raspap