First published: Wed Sep 09 2020(Updated: )
CGI implementation in Yaws web server versions 1.81 to 2.0.7 is vulnerable to OS command injection.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/yaws | <2.0.4+dfsg-2ubuntu0.1 | 2.0.4+dfsg-2ubuntu0.1 |
ubuntu/yaws | <2.0.8+dfsg-1 | 2.0.8+dfsg-1 |
debian/yaws | 2.0.8+dfsg-3 2.1.1+dfsg-2 2.2.0+dfsg-1 | |
Yaws | >=1.81<=2.0.7 | |
Ubuntu | =18.04 | |
Debian Linux | =9.0 | |
Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-24916 is classified as a high-severity vulnerability due to its potential for OS command injection.
To fix CVE-2020-24916, upgrade to Yaws versions 2.0.8 or later.
Yaws web server versions from 1.81 to 2.0.7 are affected by CVE-2020-24916.
Yes, CVE-2020-24916 can potentially allow attackers to execute arbitrary OS commands, leading to unauthorized access.
CVE-2020-24916 affects systems running Yaws on both Debian and Ubuntu platforms.