CVE-2020-12078

HIGH

Opmantek Open-audit - OS Command Injection

Title source: rule
STIX 2.1

Description

An issue was discovered in Open-AudIT 3.3.1. There is shell metacharacter injection via attributes to an open-audit/configuration/ URI. An attacker can exploit this by adding an excluded IP address to the global discovery settings (internally called exclude_ip). This exclude_ip value is passed to the exec function in the discoveries_helper.php file (inside the all_ip_list function) without being filtered, which means that the attacker can provide a payload instead of a valid IP address.

Exploits (2)

nomisec WORKING POC 18 stars
by mhaskar · poc
https://github.com/mhaskar/CVE-2020-12078
nomisec WORKING POC
by 84KaliPleXon3 · poc
https://github.com/84KaliPleXon3/CVE-2020-12078

References (4)

Core 4

Scores

CVSS v3 8.8
EPSS 0.6367
EPSS Percentile 98.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-78
Status published
Products (1)
opmantek/open-audit 3.3.1
Published Apr 28, 2020
Tracked Since Feb 18, 2026