CVE-2020-36529

A vulnerability classified as critical has been found in SevOne Network Management System up to 5.7.2.22. This affects the file traceroute.php of the Traceroute Handler. The manipulation leads to privilege escalation with a command injection. It is possible to initiate the attack remotely.
References
Link Resource
http://seclists.org/fulldisclosure/2020/Oct/5 Exploit Mailing List Third Party Advisory
https://vuldb.com/?id.162261 Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2020/Oct/5 Exploit Mailing List Third Party Advisory
https://vuldb.com/?id.162261 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:ibm:sevone_network_performance_management:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:29

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2020/Oct/5 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2020/Oct/5 - Exploit, Mailing List, Third Party Advisory
References () https://vuldb.com/?id.162261 - Third Party Advisory, VDB Entry () https://vuldb.com/?id.162261 - Third Party Advisory, VDB Entry

Information

Published : 2022-06-07 18:15

Updated : 2024-11-21 05:29


NVD link : CVE-2020-36529

Mitre link : CVE-2020-36529

CVE.ORG link : CVE-2020-36529


JSON object : View

Products Affected

ibm

  • sevone_network_performance_management
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')