Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-24796
HistoryMar 31, 2022 - 10:40 p.m.

CVE-2022-24796 Remote Command Injection in RaspberryMatic

2022-03-3122:40:17
CWE-78
GitHub_M
www.cve.org

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

10 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

76.3%

RaspberryMatic is a free and open-source operating system for running a cloud-free smart-home using the homematicIP / HomeMatic hardware line of IoT devices. A Remote Code Execution (RCE) vulnerability in the file upload facility of the WebUI interface of RaspberryMatic exists. Missing input validation/sanitization in the file upload mechanism allows remote, unauthenticated attackers with network access to the WebUI interface to achieve arbitrary operating system command execution via shell metacharacters in the HTTP query string. Injected commands are executed as root, thus leading to a full compromise of the underlying system and all its components. Versions after 2.31.25.20180428 and prior to 3.63.8.20220330 are affected. Users are advised to update to version 3.63.8.20220330 or newer. There are currently no known workarounds to mitigate the security impact and users are advised to update to the latest version available.

CNA Affected

[
  {
    "product": "RaspberryMatic",
    "vendor": "jens-maus",
    "versions": [
      {
        "status": "affected",
        "version": ">= 2.31.25.20180428, < 3.63.8.20220330"
      }
    ]
  }
]

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

10 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

76.3%

Related for CVELIST:CVE-2022-24796