CVE-2020-8233
17.08.2020, 16:15
A command injection vulnerability exists in EdgeSwitch firmware <v1.9.0 that allowed an authenticated read-only user to execute arbitrary shell commands over the HTTP interface, allowing them to escalate privileges.
Vendor | Product | Version |
---|---|---|
ui | edgeswitch_firmware | 𝑥 < 1.9.0 |
opensuse | backports_sle | 15.0:sp1 |
opensuse | backports_sle | 15.0:sp2 |
opensuse | leap | 15.1 |
opensuse | leap | 15.2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
References