CVE-2020-7863 (GCVE-0-2020-7863)

Vulnerability from cvelistv5 – Published: 2021-08-05 20:24 – Updated: 2024-08-04 09:41
VLAI?
Summary
A vulnerability in File Transfer Solution of Raonwiz could allow arbitrary command execution as the result of viewing a specially-crafted web page. This vulnerability is due to insufficient validation of the parameter of the specific method. An attacker could exploit this vulnerability by setting the parameter to the command they want to execute. A successful exploit could allow the attacker to execute arbitrary commands on a target system as the user. However, the victim must run the Internet Explorer browser with administrator privileges because of the cross-domain policy.
CWE
  • CWE-20 - Improper Input Validation
Assigner
Impacted products
Vendor Product Version
Raonwiz,inc RAON K Upload Affected: 2018.0.2.55 , < 2018.0.2.56 (custom)
Create a notification for this product.
Credits
Thanks to Samuel Koo for reporting this vulnerability.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T09:41:01.888Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36166"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.raonk.com/page/customs/modify.aspx?pSeq=20\u0026pageno=1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "platforms": [
            "windows"
          ],
          "product": "RAON K Upload",
          "vendor": "Raonwiz,inc",
          "versions": [
            {
              "lessThan": "2018.0.2.56",
              "status": "affected",
              "version": "2018.0.2.55",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Thanks to Samuel Koo for reporting this vulnerability."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in File Transfer Solution of Raonwiz could allow arbitrary command execution as the result of viewing a specially-crafted web page. This vulnerability is due to insufficient validation of the parameter of the specific method. An attacker could exploit this vulnerability by setting the parameter to the command they want to execute. A successful exploit could allow the attacker to execute arbitrary commands on a target system as the user. However, the victim must run the Internet Explorer browser with administrator privileges because of the cross-domain policy."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-08-05T20:24:26",
        "orgId": "cdd7a122-0fae-4202-8d86-14efbacc2863",
        "shortName": "krcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36166"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.raonk.com/page/customs/modify.aspx?pSeq=20\u0026pageno=1"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Update software over RAON K Uploader 2018.0.2.56 version or higher."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Raonwiz RAON K Upload Arbitrary Command Execution Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vuln@krcert.or.kr",
          "ID": "CVE-2020-7863",
          "STATE": "PUBLIC",
          "TITLE": "Raonwiz RAON K Upload Arbitrary Command Execution Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "RAON K Upload",
                      "version": {
                        "version_data": [
                          {
                            "platform": "windows",
                            "version_affected": "\u003c",
                            "version_name": "2018.0.2.55",
                            "version_value": "2018.0.2.56"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Raonwiz,inc"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Thanks to Samuel Koo for reporting this vulnerability."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in File Transfer Solution of Raonwiz could allow arbitrary command execution as the result of viewing a specially-crafted web page. This vulnerability is due to insufficient validation of the parameter of the specific method. An attacker could exploit this vulnerability by setting the parameter to the command they want to execute. A successful exploit could allow the attacker to execute arbitrary commands on a target system as the user. However, the victim must run the Internet Explorer browser with administrator privileges because of the cross-domain policy."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20 Improper Input Validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36166",
              "refsource": "MISC",
              "url": "https://boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36166"
            },
            {
              "name": "http://www.raonk.com/page/customs/modify.aspx?pSeq=20\u0026pageno=1",
              "refsource": "MISC",
              "url": "http://www.raonk.com/page/customs/modify.aspx?pSeq=20\u0026pageno=1"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "Update software over RAON K Uploader 2018.0.2.56 version or higher."
          }
        ],
        "source": {
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cdd7a122-0fae-4202-8d86-14efbacc2863",
    "assignerShortName": "krcert",
    "cveId": "CVE-2020-7863",
    "datePublished": "2021-08-05T20:24:26",
    "dateReserved": "2020-01-22T00:00:00",
    "dateUpdated": "2024-08-04T09:41:01.888Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:raonwiz:raon_k_upload:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2018.0.2.56\", \"matchCriteriaId\": \"653D8698-B7B4-4BCF-87E3-4163D716C375\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability in File Transfer Solution of Raonwiz could allow arbitrary command execution as the result of viewing a specially-crafted web page. This vulnerability is due to insufficient validation of the parameter of the specific method. An attacker could exploit this vulnerability by setting the parameter to the command they want to execute. A successful exploit could allow the attacker to execute arbitrary commands on a target system as the user. However, the victim must run the Internet Explorer browser with administrator privileges because of the cross-domain policy.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad en la Soluci\\u00f3n de Transferencia de Archivos de Raonwiz podr\\u00eda permitir una ejecuci\\u00f3n de un comando arbitrario como resultado de la visualizaci\\u00f3n de una p\\u00e1gina web especialmente dise\\u00f1ada. Esta vulnerabilidad es debido a la insuficiente comprobaci\\u00f3n del par\\u00e1metro del m\\u00e9todo espec\\u00edfico. Un atacante podr\\u00eda explotar esta vulnerabilidad al ajustar el par\\u00e1metro con el comando que desea ejecutar. Una explotaci\\u00f3n con \\u00e9xito podr\\u00eda permitir al atacante ejecutar comandos arbitrario en un sistema objetivo como el usuario. Sin embargo, la v\\u00edctima debe ejecutar el navegador Internet Explorer privilegiado de administrador debido a la pol\\u00edtica de dominio cruzado\"}]",
      "id": "CVE-2020-7863",
      "lastModified": "2024-11-21T05:37:56.150",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"vuln@krcert.or.kr\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:C/I:C/A:C\", \"baseScore\": 9.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
      "published": "2021-08-05T21:15:09.897",
      "references": "[{\"url\": \"http://www.raonk.com/page/customs/modify.aspx?pSeq=20\u0026pageno=1\", \"source\": \"vuln@krcert.or.kr\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36166\", \"source\": \"vuln@krcert.or.kr\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.raonk.com/page/customs/modify.aspx?pSeq=20\u0026pageno=1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36166\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
      "sourceIdentifier": "vuln@krcert.or.kr",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"vuln@krcert.or.kr\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2020-7863\",\"sourceIdentifier\":\"vuln@krcert.or.kr\",\"published\":\"2021-08-05T21:15:09.897\",\"lastModified\":\"2024-11-21T05:37:56.150\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in File Transfer Solution of Raonwiz could allow arbitrary command execution as the result of viewing a specially-crafted web page. This vulnerability is due to insufficient validation of the parameter of the specific method. An attacker could exploit this vulnerability by setting the parameter to the command they want to execute. A successful exploit could allow the attacker to execute arbitrary commands on a target system as the user. However, the victim must run the Internet Explorer browser with administrator privileges because of the cross-domain policy.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en la Soluci\u00f3n de Transferencia de Archivos de Raonwiz podr\u00eda permitir una ejecuci\u00f3n de un comando arbitrario como resultado de la visualizaci\u00f3n de una p\u00e1gina web especialmente dise\u00f1ada. Esta vulnerabilidad es debido a la insuficiente comprobaci\u00f3n del par\u00e1metro del m\u00e9todo espec\u00edfico. Un atacante podr\u00eda explotar esta vulnerabilidad al ajustar el par\u00e1metro con el comando que desea ejecutar. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar comandos arbitrario en un sistema objetivo como el usuario. Sin embargo, la v\u00edctima debe ejecutar el navegador Internet Explorer privilegiado de administrador debido a la pol\u00edtica de dominio cruzado\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"vuln@krcert.or.kr\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"vuln@krcert.or.kr\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:raonwiz:raon_k_upload:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2018.0.2.56\",\"matchCriteriaId\":\"653D8698-B7B4-4BCF-87E3-4163D716C375\"}]}]}],\"references\":[{\"url\":\"http://www.raonk.com/page/customs/modify.aspx?pSeq=20\u0026pageno=1\",\"source\":\"vuln@krcert.or.kr\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36166\",\"source\":\"vuln@krcert.or.kr\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.raonk.com/page/customs/modify.aspx?pSeq=20\u0026pageno=1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36166\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…