An issue was discovered on Spirent TestCenter and Avalanche appliance admin interface firmware. An attacker, who already has access to an SSH restricted shell, can achieve root access via shell metacharacters. The attacker can then, for example, read sensitive files such as appliance admin configuration source code. This affects Spirent TestCenter and Avalanche products which chassis version <= 5.08. The SSH restricted shell is available with default credentials.
References
Link | Resource |
---|---|
https://gist.github.com/a05110511t/65d07bc776d7c11b4ccf112a09cca4ab | Third Party Advisory |
https://github.com/a05110511t/CVE/blob/master/CVE-2020-11733.md | Third Party Advisory |
https://gist.github.com/a05110511t/65d07bc776d7c11b4ccf112a09cca4ab | Third Party Advisory |
https://github.com/a05110511t/CVE/blob/master/CVE-2020-11733.md | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/a05110511t/65d07bc776d7c11b4ccf112a09cca4ab - Third Party Advisory | |
References | () https://github.com/a05110511t/CVE/blob/master/CVE-2020-11733.md - Third Party Advisory |
Information
Published : 2020-08-13 14:15
Updated : 2024-11-21 04:58
NVD link : CVE-2020-11733
Mitre link : CVE-2020-11733
CVE.ORG link : CVE-2020-11733
JSON object : View
Products Affected
spirent
- testcenter
- c100-mp
- avalanche
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')