|
|||
Rule General Information |
---|
Release Date: | 2021-01-28 | |
Rule Name: | Intellian Aptus Web libagent.cgi OS Command Injection Vulnerability (CVE-2020-7980) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Intellian Aptus Web 1.24 allows remote attackers to execute arbitrary OS commands via the Q field within JSON data to the cgi-bin/libagent.cgi URI. NOTE: a valid sid cookie for a login to the intellian default account might be needed. | |
Impact: | An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Linux, Others | |
Reference: | http://packetstormsecurity.com/files/156143/Satellian-1.12-Remote-Code-Execution.html https://github.com/Xh4H/Satellian-CVE-2020-7980 https://sku11army.blogspot.com/2020/01/intellian-aptus-web-rce-intellian.html |
|
Solutions |
---|
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product. |