CVE-2020-11108
HIGHPi-Hole heisenbergCompensator Blocklist OS Command Execution
Title source: metasploitDescription
The Gravity updater in Pi-hole through 4.4 allows an authenticated adversary to upload arbitrary files. This can be abused for Remote Code Execution by writing to a PHP file in the web directory. (Also, it can be used in conjunction with the sudo rule for the www-data user to escalate privileges to root.) The code error is in gravity_DownloadBlocklistFromUrl in gravity.sh.
Exploits (6)
exploitdb
WORKING POC
VERIFIED
by Photubias · pythonwebappslinux
https://www.exploit-db.com/exploits/48519
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotephp
https://www.exploit-db.com/exploits/48491
exploitdb
WORKING POC
by Nick Frichette · pythonwebappslinux
https://www.exploit-db.com/exploits/48443
exploitdb
WORKING POC
by Nick Frichette · pythonwebappslinux
https://www.exploit-db.com/exploits/48442
metasploit
WORKING POC
EXCELLENT
by h00die, Nick Frichette · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/http/pihole_blocklist_exec.rb
References (6)
Scores
CVSS v3
8.8
EPSS
0.8959
EPSS Percentile
99.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-434
Status
published
Products (1)
pi-hole/pi-hole
< 4.4
Published
May 11, 2020
Tracked Since
Feb 18, 2026