The administration console of the Moog EXO Series EXVF5C-2 and EXVP7C2-3 units features a 'statusbroadcast' command that can spawn a given process repeatedly at a certain time interval as 'root'. One of the limitations of this feature is that it only takes a path to a binary without arguments; however, this can be circumvented using special shell variables, such as '${IFS}'. As a result, an attacker can execute arbitrary commands as 'root' on the units.
References
Link | Resource |
---|---|
https://ioac.tv/3hy1xu6 | Exploit Third Party Advisory |
https://ioactive.com/moog-exo-series-multiple-vulnerabilities/ | Third Party Advisory |
https://ioac.tv/3hy1xu6 | Exploit Third Party Advisory |
https://ioactive.com/moog-exo-series-multiple-vulnerabilities/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://ioac.tv/3hy1xu6 - Exploit, Third Party Advisory | |
References | () https://ioactive.com/moog-exo-series-multiple-vulnerabilities/ - Third Party Advisory |
Information
Published : 2020-08-21 15:15
Updated : 2024-11-21 05:14
NVD link : CVE-2020-24054
Mitre link : CVE-2020-24054
CVE.ORG link : CVE-2020-24054
JSON object : View
Products Affected
moog
- exvf5c-2
- exvp7c2-3_firmware
- exvf5c-2_firmware
- exvp7c2-3
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')