CGI implementation in Yaws web server versions 1.81 to 2.0.7 is vulnerable to OS command injection.
References
Link | Resource |
---|---|
https://github.com/erlyaws/yaws/commits/master | Patch Third Party Advisory |
https://github.com/vulnbe/poc-yaws-cgi-shell-injection | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/09/msg00022.html | Mailing List Third Party Advisory |
https://packetstormsecurity.com/files/159106/Yaws-2.0.7-XML-Injection-Command-Injection.html | Exploit Third Party Advisory VDB Entry |
https://usn.ubuntu.com/4569-1/ | Third Party Advisory |
https://vuln.be/post/yaws-xxe-and-shell-injections/ | Exploit Third Party Advisory |
https://www.debian.org/security/2020/dsa-4773 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-09-09T18:10:25
Updated: 2020-10-17T03:06:20
Reserved: 2020-08-28T00:00:00
Link: CVE-2020-24916
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-09-09T19:15:21.147
Modified: 2022-12-06T21:08:01.340
Link: CVE-2020-24916
JSON object: View
Redhat Information
No data.
CWE