// For flags

CVE-2020-7350

Metasploit Framework Plugin Libnotify Command Injection

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Rapid7 Metasploit Framework versions before 5.0.85 suffers from an instance of CWE-78: OS Command Injection, wherein the libnotify plugin accepts untrusted user-supplied data via a remote computer's hostname or service name. An attacker can create a specially-crafted hostname or service name to be imported by Metasploit from a variety of sources and trigger a command injection on the operator's terminal. Note, only the Metasploit Framework and products that expose the plugin system is susceptible to this issue -- notably, this does not include Rapid7 Metasploit Pro. Also note, this vulnerability cannot be triggered through a normal scan operation -- the attacker would have to supply a file that is processed with the db_import command.

Las versiones de Rapid7 Metasploit Framework anteriores a la versión 5.0.85 sufren de una instancia de CWE-78: Inyección de comandos del sistema operativo, en la que el complemento libnotify acepta datos no seguros proporcionados por el usuario a través del nombre de host o nombre de servicio de un ordenador remoto. Un atacante puede crear un nombre de host o nombre de servicio especialmente diseñado para ser importado por Metasploit desde una variedad de fuentes y desencadenar una inyección de comando en la terminal del operador. Tenga en cuenta que solo Metasploit Framework y los productos que exponen el sistema de complementos son susceptibles a este problema; en particular, esto no incluye Rapid7 Metasploit Pro. También tenga en cuenta que esta vulnerabilidad no puede activarse mediante una operación de exploración normal: el atacante tendría que proporcionar un archivo que se procese con el comando db_import.

*Credits: This issue was discovered and reported to Rapid7 by javier aguinaga.
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-01-21 CVE Reserved
  • 2020-04-17 CVE Published
  • 2024-03-23 EPSS Updated
  • 2024-09-17 CVE Updated
  • 2024-09-17 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Rapid7
Search vendor "Rapid7"
Metasploit
Search vendor "Rapid7" for product "Metasploit"
< 5.0.85
Search vendor "Rapid7" for product "Metasploit" and version " < 5.0.85"
-
Affected