First published: Tue Apr 28 2020(Updated: )
An issue was discovered in Open-AudIT 3.3.1. There is shell metacharacter injection via attributes to an open-audit/configuration/ URI. An attacker can exploit this by adding an excluded IP address to the global discovery settings (internally called exclude_ip). This exclude_ip value is passed to the exec function in the discoveries_helper.php file (inside the all_ip_list function) without being filtered, which means that the attacker can provide a payload instead of a valid IP address.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opmantek Open-AudIT | =3.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-12078 is critical with a CVSS score of 8.8.
An attacker can exploit CVE-2020-12078 by adding an excluded IP address to the global discovery settings.
To fix CVE-2020-12078, update Open-AudIT to version 3.3.2 or later.
The CWE ID for CVE-2020-12078 is CWE-78.
You can find more information about CVE-2020-12078 at the following references: [link1], [link2], [link3].