In SapphireIMS 5.0, it is possible to use the hardcoded credential in clients (username: sapphire, password: ims) and gain access to the portal. Once the access is available, the attacker can inject malicious OS commands on “ping”, “traceroute” and “snmp” functions and execute code on the server.
References
Link | Resource |
---|---|
https://vuln.shellcoder.party/2020/09/19/cve-2020-25565-sapphireims-unprivileged-user-remote-command-execution-on-server/ | Exploit Third Party Advisory |
https://vuln.shellcoder.party/tags/sapphireims/ | Exploit Third Party Advisory |
https://vuln.shellcoder.party/2020/09/19/cve-2020-25565-sapphireims-unprivileged-user-remote-command-execution-on-server/ | Exploit Third Party Advisory |
https://vuln.shellcoder.party/tags/sapphireims/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://vuln.shellcoder.party/2020/09/19/cve-2020-25565-sapphireims-unprivileged-user-remote-command-execution-on-server/ - Exploit, Third Party Advisory | |
References | () https://vuln.shellcoder.party/tags/sapphireims/ - Exploit, Third Party Advisory |
Information
Published : 2021-08-11 21:15
Updated : 2024-11-21 05:18
NVD link : CVE-2020-25565
Mitre link : CVE-2020-25565
CVE.ORG link : CVE-2020-25565
JSON object : View
Products Affected
sapphireims
- sapphireims
CWE
CWE-798
Use of Hard-coded Credentials