RULE(RULE ID:332442)

Rule General Information
Release Date: 2021-01-28
Rule Name: Intellian Aptus Web libagent.cgi OS Command Injection Vulnerability (CVE-2020-7980)
Severity:
CVE ID:
Rule Protection Details
Description: Intellian Aptus Web 1.24 allows remote attackers to execute arbitrary OS commands via the Q field within JSON data to the cgi-bin/libagent.cgi URI. NOTE: a valid sid cookie for a login to the intellian default account might be needed.
Impact: An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Linux, Others
Reference: http://packetstormsecurity.com/files/156143/Satellian-1.12-Remote-Code-Execution.html
https://github.com/Xh4H/Satellian-CVE-2020-7980
https://sku11army.blogspot.com/2020/01/intellian-aptus-web-rce-intellian.html
Solutions
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.