openmediavault before 4.1.36 and 5.x before 5.5.12 allows authenticated PHP code injection attacks, via the sortfield POST parameter of rpc.php, because json_encode_safe is not used in config/databasebackend.inc. Successful exploitation allows arbitrary command execution on the underlying operating system as root
Reporter | Title | Published | Views | Family All 9 |
---|---|---|---|---|
![]() | Openmediavault < 3.0.100, 4.x < 4.1.36, 5.x < 5.5.12 PHP Code Injection Vulnerability. | 25 Sep 202300:00 | – | openvas |
![]() | Code injection | 2 Oct 202009:15 | – | prion |
![]() | OpenMediaVault rpc.php Authenticated PHP Code Injection | 25 Nov 202000:00 | – | packetstorm |
![]() | CVE-2020-26124 | 2 Oct 202009:15 | – | nvd |
![]() | OpenMediaVault rpc.php Authenticated PHP Code Injection Exploit | 25 Nov 202000:00 | – | zdt |
![]() | OpenMediaVault rpc.php Authenticated PHP Code Injection | 7 Oct 202006:59 | – | metasploit |
![]() | CVE-2020-26124 | 2 Oct 202009:15 | – | osv |
![]() | CVE-2020-26124 | 2 Oct 202008:28 | – | cvelist |
![]() | Metasploit Wrap-Up | 27 Nov 202016:22 | – | rapid7blog |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo