CVE-2020-26124

openmediavault before 4.1.36 and 5.x before 5.5.12 allows authenticated PHP code injection attacks, via the sortfield POST parameter of rpc.php, because json_encode_safe is not used in config/databasebackend.inc. Successful exploitation allows arbitrary command execution on the underlying operating system as root.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openmediavault:openmediavault:*:*:*:*:*:*:*:*
cpe:2.3:a:openmediavault:openmediavault:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:19

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/160223/OpenMediaVault-rpc.php-Authenticated-PHP-Code-Injection.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/160223/OpenMediaVault-rpc.php-Authenticated-PHP-Code-Injection.html - Exploit, Third Party Advisory, VDB Entry
References () https://github.com/openmediavault/openmediavault/commit/ebb51bbf5a39f4955eab0073bf87f2a31926d85d - Patch, Third Party Advisory () https://github.com/openmediavault/openmediavault/commit/ebb51bbf5a39f4955eab0073bf87f2a31926d85d - Patch, Third Party Advisory
References () https://www.openmediavault.org/?p=2797 - Vendor Advisory () https://www.openmediavault.org/?p=2797 - Vendor Advisory

Information

Published : 2020-10-02 09:15

Updated : 2024-11-21 05:19


NVD link : CVE-2020-26124

Mitre link : CVE-2020-26124

CVE.ORG link : CVE-2020-26124


JSON object : View

Products Affected

openmediavault

  • openmediavault
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')