First published: Wed Sep 02 2020(Updated: )
RAONWIZ v2018.0.2.50 and earlier versions contains a vulnerability that could allow remote files to be downloaded by lack of validation. Vulnerabilities in downloading with Kupload agent allow files to be downloaded to arbitrary paths due to insufficient verification of extensions and download paths. This issue affects: RAONWIZ RAON KUpload 2018.0.2.50 versions and earlier.
Credit: vuln@krcert.or.kr
Affected Software | Affected Version | How to fix |
---|---|---|
RAONWIZ RAON KUpload | <=2018.0.2.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7830 is a vulnerability in RAONWIZ v2018.0.2.50 and earlier versions that allows remote files to be downloaded without proper validation.
CVE-2020-7830 has a severity rating of 7.8 (high).
CVE-2020-7830 allows attackers to download remote files by exploiting insufficient validation in downloading with Kupload agent in RAONWIZ versions 2018.0.2.50 and earlier.
To fix CVE-2020-7830, it is recommended to update RAONWIZ to a version that includes the necessary security patches.
You can find more information about CVE-2020-7830 at the following link: [https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35582](https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35582)