CVE-2020-10569
Sysaid 20.1.11 b26 Remote Command Execution
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
SysAid On-Premise 20.1.11, by default, allows the AJP protocol port, which is vulnerable to a GhostCat attack. Additionally, it allows unauthenticated access to upload files, which can be used to execute commands on the system by chaining it with a GhostCat attack. NOTE: This may be a duplicate of CVE-2020-1938
** EN DISPUTA ** SysAid On-Premise versiĆ³n 20.1.11, por defecto, habilita el puerto de protocolo AJP, el cual es vulnerable a un ataque de tipo GhostCat. Adicionalmente, permite un acceso no autenticado para cargar archivos, los cuales pueden ser usados para ejecutar comandos en el sistema al encadenarlo con un ataque de tipo GhostCat. NOTA: Esto puede ser un duplicado de CVE-2020-1938.
Sysaid version 20.1.11 b26 suffers from an AJP13 remote command execution vulnerability.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2020-03-14 CVE Reserved
- 2020-04-21 CVE Published
- 2024-03-28 EPSS Updated
- 2024-11-18 CVE Updated
- 2024-11-18 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-434: Unrestricted Upload of File with Dangerous Type
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
http://packetstormsecurity.com/files/157314/Sysaid-20.1.11-b26-Remote-Command-Execution.html | 2024-11-18 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.sysaid.com/product/on-premise/20-2/release-notes | 2024-05-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Sysaid Search vendor "Sysaid" | On-premise Search vendor "Sysaid" for product "On-premise" | 20.1.11 Search vendor "Sysaid" for product "On-premise" and version "20.1.11" | - |
Affected
|