CVE-2020-15645
HIGHMarvell Qconvergeconsole < 5.5.00.73 - Unrestricted File Upload
Title source: ruleDescription
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Marvell QConvergeConsole 5.5.0.64. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the getFileFromURL method of the GWTTestServiceImpl class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-10553.
References (3)
Core 3
Core References
Vendor Advisory x_refsource_misc
https://www.marvell.com/content/dam/marvell/en/public-collateral/fibre-channel/marvell-fibre-channel-security-advisory-2020-07.pdf
Third Party Advisory, VDB Entry x_refsource_misc
https://www.zerodayinitiative.com/advisories/ZDI-20-973/
Exploit, Third Party Advisory x_refsource_misc
https://www.tenable.com/security/research/tra-2020-56
Scores
CVSS v3
8.8
EPSS
0.0602
EPSS Percentile
90.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-434
Status
published
Products (1)
marvell/qconvergeconsole
< 5.5.00.73
Published
Aug 25, 2020
Tracked Since
Feb 18, 2026