Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-15121
HistoryJul 20, 2020 - 6:00 p.m.

CVE-2020-15121 Command injection in Radare2

2020-07-2018:00:25
CWE-78
GitHub_M
www.cve.org

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N

9.3 High

AI Score

Confidence

High

0.011 Low

EPSS

Percentile

84.6%

In radare2 before version 4.5.0, malformed PDB file names in the PDB server path cause shell injection. To trigger the problem it’s required to open the executable in radare2 and run idpd to trigger the download. The shell code will execute, and will create a file called pwned in the current directory.

CNA Affected

[
  {
    "product": "radare2",
    "vendor": "radareorg",
    "versions": [
      {
        "status": "affected",
        "version": "< 4.5.0"
      }
    ]
  }
]

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N

9.3 High

AI Score

Confidence

High

0.011 Low

EPSS

Percentile

84.6%