CVE-2020-7361

The EasyCorp ZenTao Pro application suffers from an OS command injection vulnerability in its '/pro/repo-create.html' component. After authenticating to the ZenTao dashboard, attackers may construct and send arbitrary OS commands via the POST parameter 'path', and those commands will run in an elevated SYSTEM context on the underlying Windows operating system.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:easycorp:zentao_pro:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:37

Type Values Removed Values Added
CVSS v2 : 9.0
v3 : 8.8
v2 : 9.0
v3 : 9.6
References () https://github.com/rapid7/metasploit-framework/pull/13828 - Exploit, Third Party Advisory () https://github.com/rapid7/metasploit-framework/pull/13828 - Exploit, Third Party Advisory

Information

Published : 2020-08-06 16:15

Updated : 2024-11-21 05:37


NVD link : CVE-2020-7361

Mitre link : CVE-2020-7361

CVE.ORG link : CVE-2020-7361


JSON object : View

Products Affected

easycorp

  • zentao_pro
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')