In SapphireIMS 5.0, it is possible to use the hardcoded credential in clients (username: sapphire, password: ims) and gain access to the portal. Once the access is available, the attacker can inject malicious OS commands on “ping”, “traceroute” and “snmp” functions and execute code on the server.
References
Link | Resource |
---|---|
https://vuln.shellcoder.party/2020/09/19/cve-2020-25565-sapphireims-unprivileged-user-remote-command-execution-on-server/ | Exploit Third Party Advisory |
https://vuln.shellcoder.party/tags/sapphireims/ | Exploit Third Party Advisory |
Configurations
Information
Published : 2021-08-11 14:15
Updated : 2021-08-17 11:11
NVD link : CVE-2020-25565
Mitre link : CVE-2020-25565
JSON object : View
CWE
CWE-798
Use of Hard-coded Credentials
Products Affected
sapphireims
- sapphireims