CVE-2020-11733

An issue was discovered on Spirent TestCenter and Avalanche appliance admin interface firmware. An attacker, who already has access to an SSH restricted shell, can achieve root access via shell metacharacters. The attacker can then, for example, read sensitive files such as appliance admin configuration source code. This affects Spirent TestCenter and Avalanche products which chassis version <= 5.08. The SSH restricted shell is available with default credentials.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:spirent:avalanche:*:*:*:*:*:*:*:*
cpe:2.3:a:spirent:testcenter:*:*:*:*:*:*:*:*
cpe:2.3:h:spirent:c100-mp:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:58

Type Values Removed Values Added
References () https://gist.github.com/a05110511t/65d07bc776d7c11b4ccf112a09cca4ab - Third Party Advisory () https://gist.github.com/a05110511t/65d07bc776d7c11b4ccf112a09cca4ab - Third Party Advisory
References () https://github.com/a05110511t/CVE/blob/master/CVE-2020-11733.md - Third Party Advisory () https://github.com/a05110511t/CVE/blob/master/CVE-2020-11733.md - Third Party Advisory

Information

Published : 2020-08-13 14:15

Updated : 2024-11-21 04:58


NVD link : CVE-2020-11733

Mitre link : CVE-2020-11733

CVE.ORG link : CVE-2020-11733


JSON object : View

Products Affected

spirent

  • testcenter
  • c100-mp
  • avalanche
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')