An issue was discovered in Ozeki NG SMS Gateway through 4.17.6. It stores SMS messages in .NET serialized format on the filesystem. By generating (and writing to the disk) malicious .NET serialized files, an attacker can trick the product into deserializing them, resulting in arbitrary code execution.
References
Link | Resource |
---|---|
http://www.ozeki.hu/index.php?owpn=231 | Vendor Advisory |
https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14030-RCE%20via%20.NET%20Deserialization-Ozeki%20SMS%20Gateway | Patch Third Party Advisory |
http://www.ozeki.hu/index.php?owpn=231 | Vendor Advisory |
https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14030-RCE%20via%20.NET%20Deserialization-Ozeki%20SMS%20Gateway | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 05:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.ozeki.hu/index.php?owpn=231 - Vendor Advisory | |
References | () https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14030-RCE%20via%20.NET%20Deserialization-Ozeki%20SMS%20Gateway - Patch, Third Party Advisory |
Information
Published : 2020-09-30 18:15
Updated : 2024-11-21 05:02
NVD link : CVE-2020-14030
Mitre link : CVE-2020-14030
CVE.ORG link : CVE-2020-14030
JSON object : View
Products Affected
ozeki
- ozeki_ng_sms_gateway
CWE
CWE-502
Deserialization of Untrusted Data