First published: Thu Aug 05 2021(Updated: )
A vulnerability in File Transfer Solution of Raonwiz could allow arbitrary command execution as the result of viewing a specially-crafted web page. This vulnerability is due to insufficient validation of the parameter of the specific method. An attacker could exploit this vulnerability by setting the parameter to the command they want to execute. A successful exploit could allow the attacker to execute arbitrary commands on a target system as the user. However, the victim must run the Internet Explorer browser with administrator privileges because of the cross-domain policy.
Credit: vuln@krcert.or.kr
Affected Software | Affected Version | How to fix |
---|---|---|
Raonwiz Raon K Upload | <2018.0.2.56 |
Update software over RAON K Uploader 2018.0.2.56 version or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-7863.
CVE-2020-7863 has a severity of 8.8 (Critical).
The affected software is Raonwiz Raon K Upload up to version 2018.0.2.56.
An attacker can exploit CVE-2020-7863 by setting a specially-crafted parameter in a web page.
Yes, you can find references for CVE-2020-7863 at the following links: [link1](http://www.raonk.com/page/customs/modify.aspx?pSeq=20&pageno=1), [link2](https://boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36166).