In SapphireIMS 5.0, it is possible to use the hardcoded credential in clients (username: sapphire, password: ims) and gain access to the portal. Once the access is available, the attacker can inject malicious OS commands on “ping”, “traceroute” and “snmp” functions and execute code on the server. We also observed the same is true if the JSESSIONID is completely removed.
References
Link | Resource |
---|---|
https://vuln.shellcoder.party/2020/09/19/cve-2020-25560-sapphireims-unauthenticated-remote-command-execution-on-server/ | Exploit Third Party Advisory |
https://vuln.shellcoder.party/tags/sapphireims/ | Third Party Advisory |
Configurations
Information
Published : 2021-08-11 14:15
Updated : 2021-08-16 09:47
NVD link : CVE-2020-25560
Mitre link : CVE-2020-25560
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
sapphireims
- sapphireims