ID

VAR-202004-0067


CVE

CVE-2020-10603


TITLE

WebAccess/NMS In OS Command injection vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2020-003821

DESCRIPTION

WebAccess/NMS (versions prior to 3.0.2) does not properly sanitize user input and may allow an attacker to inject system commands remotely. WebAccess/NMS To OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/NMS. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.The specific flaw exists within the processing of calls to the ManualDBBackup endpoint. When parsing the filenamebknow parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Advantech WebAccess/NMS is a set of Web browser-based Network Management System (NMS) software package developed by China Taiwan Advantech Corporation. There is an operating system command injection vulnerability in Advantech WebAccess/NMS versions before 3.0.2. The vulnerability is caused by the program not sanitizing user input

Trust: 2.34

sources: NVD: CVE-2020-10603 // JVNDB: JVNDB-2020-003821 // ZDI: ZDI-20-444 // VULHUB: VHN-163098

AFFECTED PRODUCTS

vendor:advantechmodel:webaccess\/nmsscope:ltversion:3.0.2

Trust: 1.0

vendor:advantechmodel:webaccess/nmsscope:eqversion:3.0.2

Trust: 0.8

vendor:advantechmodel:webaccess/nmsscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-20-444 // JVNDB: JVNDB-2020-003821 // NVD: CVE-2020-10603

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-10603
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-003821
value: HIGH

Trust: 0.8

ZDI: CVE-2020-10603
value: HIGH

Trust: 0.7

CNNVD: CNNVD-202004-380
value: HIGH

Trust: 0.6

VULHUB: VHN-163098
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-10603
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-003821
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-163098
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-10603
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-003821
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2020-10603
baseSeverity: HIGH
baseScore: 8.8
vectorString: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-20-444 // VULHUB: VHN-163098 // JVNDB: JVNDB-2020-003821 // CNNVD: CNNVD-202004-380 // NVD: CVE-2020-10603

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.9

sources: VULHUB: VHN-163098 // JVNDB: JVNDB-2020-003821 // NVD: CVE-2020-10603

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202004-380

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-202004-380

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-003821

PATCH

title:Top Pageurl:https://www.advantech.com/

Trust: 0.8

title:Advantech has issued an update to correct this vulnerability.url:https://www.us-cert.gov/ics/advisories/icsa-20-098-01

Trust: 0.7

title:Advantech WebAccess/NMS Fixes for operating system command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=115600

Trust: 0.6

sources: ZDI: ZDI-20-444 // JVNDB: JVNDB-2020-003821 // CNNVD: CNNVD-202004-380

EXTERNAL IDS

db:NVDid:CVE-2020-10603

Trust: 3.2

db:ICS CERTid:ICSA-20-098-01

Trust: 2.5

db:ZDIid:ZDI-20-444

Trust: 1.3

db:JVNDBid:JVNDB-2020-003821

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-9826

Trust: 0.7

db:CNNVDid:CNNVD-202004-380

Trust: 0.7

db:AUSCERTid:ESB-2020.1251

Trust: 0.6

db:NSFOCUSid:46344

Trust: 0.6

db:CNVDid:CNVD-2020-22310

Trust: 0.1

db:VULHUBid:VHN-163098

Trust: 0.1

sources: ZDI: ZDI-20-444 // VULHUB: VHN-163098 // JVNDB: JVNDB-2020-003821 // CNNVD: CNNVD-202004-380 // NVD: CVE-2020-10603

REFERENCES

url:https://www.us-cert.gov/ics/advisories/icsa-20-098-01

Trust: 3.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-10603

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-10603

Trust: 0.8

url:http://www.nsfocus.net/vulndb/46344

Trust: 0.6

url:https://www.zerodayinitiative.com/advisories/zdi-20-444/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1251/

Trust: 0.6

sources: ZDI: ZDI-20-444 // VULHUB: VHN-163098 // JVNDB: JVNDB-2020-003821 // CNNVD: CNNVD-202004-380 // NVD: CVE-2020-10603

CREDITS

rgod of 9sg

Trust: 0.7

sources: ZDI: ZDI-20-444

SOURCES

db:ZDIid:ZDI-20-444
db:VULHUBid:VHN-163098
db:JVNDBid:JVNDB-2020-003821
db:CNNVDid:CNNVD-202004-380
db:NVDid:CVE-2020-10603

LAST UPDATE DATE

2024-11-23T21:59:22.225000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-20-444date:2020-04-08T00:00:00
db:VULHUBid:VHN-163098date:2020-04-10T00:00:00
db:JVNDBid:JVNDB-2020-003821date:2020-04-24T00:00:00
db:CNNVDid:CNNVD-202004-380date:2020-04-14T00:00:00
db:NVDid:CVE-2020-10603date:2024-11-21T04:55:40.890

SOURCES RELEASE DATE

db:ZDIid:ZDI-20-444date:2020-04-08T00:00:00
db:VULHUBid:VHN-163098date:2020-04-09T00:00:00
db:JVNDBid:JVNDB-2020-003821date:2020-04-24T00:00:00
db:CNNVDid:CNNVD-202004-380date:2020-04-07T00:00:00
db:NVDid:CVE-2020-10603date:2020-04-09T14:15:12.463