Lucene search

K
githubGitHub Advisory DatabaseGHSA-7R88-WJHJ-JR8M
HistoryAug 01, 2023 - 3:30 p.m.

RaspAP Command Injection vulnerability

2023-08-0115:30:30
CWE-77
GitHub Advisory Database
github.com
10
raspap
command injection
vulnerability
authenticated
attacker
execute
arbitrary os commands
root
entity
post parameters
ajax
networking
get_wgkey.php

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

32.9%

A Command injection vulnerability in RaspAP 2.8.0 thru 2.9.2 allows an authenticated attacker to execute arbitrary OS commands as root via the entity POST parameters in /ajax/networking/get_wgkey.php.

Affected configurations

Vulners
Node
billzraspap-webguiRange2.8.02.9.5
VendorProductVersionCPE
billzraspap-webgui*cpe:2.3:a:billz:raspap-webgui:*:*:*:*:*:*:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

32.9%

Related for GHSA-7R88-WJHJ-JR8M