CVE-2020-24916

CRITICAL

Yaws < 2.0.7 - OS Command Injection

Title source: rule
STIX 2.1

Description

CGI implementation in Yaws web server versions 1.81 to 2.0.7 is vulnerable to OS command injection.

References (7)

Core 7
Core References
Patch, Third Party Advisory x_refsource_misc
https://github.com/erlyaws/yaws/commits/master
Exploit, Third Party Advisory x_refsource_misc
https://vuln.be/post/yaws-xxe-and-shell-injections/
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2020/09/msg00022.html
Third Party Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/4569-1/
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2020/dsa-4773

Scores

CVSS v3 9.8
EPSS 0.4425
EPSS Percentile 97.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-78
Status published
Products (4)
canonical/ubuntu_linux 18.04
debian/debian_linux 9.0
debian/debian_linux 10.0
yaws/yaws 1.81 - 2.0.7
Published Sep 09, 2020
Tracked Since Feb 18, 2026