Search criteria

1 vulnerability by Raonwiz,inc

CVE-2020-7863 (GCVE-0-2020-7863)

Vulnerability from cvelistv5 – Published: 2021-08-05 20:24 – Updated: 2024-08-04 09:41
VLAI?
Summary
A vulnerability in File Transfer Solution of Raonwiz could allow arbitrary command execution as the result of viewing a specially-crafted web page. This vulnerability is due to insufficient validation of the parameter of the specific method. An attacker could exploit this vulnerability by setting the parameter to the command they want to execute. A successful exploit could allow the attacker to execute arbitrary commands on a target system as the user. However, the victim must run the Internet Explorer browser with administrator privileges because of the cross-domain policy.
CWE
  • CWE-20 - Improper Input Validation
Assigner
Impacted products
Vendor Product Version
Raonwiz,inc RAON K Upload Affected: 2018.0.2.55 , < 2018.0.2.56 (custom)
Create a notification for this product.
Credits
Thanks to Samuel Koo for reporting this vulnerability.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T09:41:01.888Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36166"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.raonk.com/page/customs/modify.aspx?pSeq=20\u0026pageno=1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "platforms": [
            "windows"
          ],
          "product": "RAON K Upload",
          "vendor": "Raonwiz,inc",
          "versions": [
            {
              "lessThan": "2018.0.2.56",
              "status": "affected",
              "version": "2018.0.2.55",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Thanks to Samuel Koo for reporting this vulnerability."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in File Transfer Solution of Raonwiz could allow arbitrary command execution as the result of viewing a specially-crafted web page. This vulnerability is due to insufficient validation of the parameter of the specific method. An attacker could exploit this vulnerability by setting the parameter to the command they want to execute. A successful exploit could allow the attacker to execute arbitrary commands on a target system as the user. However, the victim must run the Internet Explorer browser with administrator privileges because of the cross-domain policy."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-08-05T20:24:26",
        "orgId": "cdd7a122-0fae-4202-8d86-14efbacc2863",
        "shortName": "krcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36166"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.raonk.com/page/customs/modify.aspx?pSeq=20\u0026pageno=1"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Update software over RAON K Uploader 2018.0.2.56 version or higher."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Raonwiz RAON K Upload Arbitrary Command Execution Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vuln@krcert.or.kr",
          "ID": "CVE-2020-7863",
          "STATE": "PUBLIC",
          "TITLE": "Raonwiz RAON K Upload Arbitrary Command Execution Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "RAON K Upload",
                      "version": {
                        "version_data": [
                          {
                            "platform": "windows",
                            "version_affected": "\u003c",
                            "version_name": "2018.0.2.55",
                            "version_value": "2018.0.2.56"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Raonwiz,inc"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Thanks to Samuel Koo for reporting this vulnerability."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in File Transfer Solution of Raonwiz could allow arbitrary command execution as the result of viewing a specially-crafted web page. This vulnerability is due to insufficient validation of the parameter of the specific method. An attacker could exploit this vulnerability by setting the parameter to the command they want to execute. A successful exploit could allow the attacker to execute arbitrary commands on a target system as the user. However, the victim must run the Internet Explorer browser with administrator privileges because of the cross-domain policy."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20 Improper Input Validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36166",
              "refsource": "MISC",
              "url": "https://boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36166"
            },
            {
              "name": "http://www.raonk.com/page/customs/modify.aspx?pSeq=20\u0026pageno=1",
              "refsource": "MISC",
              "url": "http://www.raonk.com/page/customs/modify.aspx?pSeq=20\u0026pageno=1"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "Update software over RAON K Uploader 2018.0.2.56 version or higher."
          }
        ],
        "source": {
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cdd7a122-0fae-4202-8d86-14efbacc2863",
    "assignerShortName": "krcert",
    "cveId": "CVE-2020-7863",
    "datePublished": "2021-08-05T20:24:26",
    "dateReserved": "2020-01-22T00:00:00",
    "dateUpdated": "2024-08-04T09:41:01.888Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}