CVE-2020-35729
CRITICAL NUCLEIKlogserver Klog Server - OS Command Injection
Title source: ruleDescription
KLog Server 2.4.1 allows OS command injection via shell metacharacters in the actions/authenticate.php user parameter.
Exploits (4)
exploitdb
WORKING POC
VERIFIED
by Metin Yunus Kandemir · rubywebappsphp
https://www.exploit-db.com/exploits/49474
exploitdb
WORKING POC
VERIFIED
by B3KC4T · pythonwebappsphp
https://www.exploit-db.com/exploits/49366
metasploit
WORKING POC
EXCELLENT
by b3kc4t, Metin Yunus Kandemir, bcoles · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/klog_server_authenticate_user_unauth_command_injection.rb
Nuclei Templates (1)
Klog Server <=2.41 - Unauthenticated Command Injection
CRITICALby dwisiswant0
References (5)
Scores
CVSS v3
9.8
EPSS
0.8975
EPSS Percentile
99.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-78
Status
published
Products (1)
klogserver/klog_server
2.4.1
Published
Dec 27, 2020
Tracked Since
Feb 18, 2026