CVE-2020-35729

CRITICAL NUCLEI

Klogserver Klog Server - OS Command Injection

Title source: rule

Description

KLog Server 2.4.1 allows OS command injection via shell metacharacters in the actions/authenticate.php user parameter.

Exploits (4)

exploitdb WORKING POC VERIFIED
by Metin Yunus Kandemir · rubywebappsphp
https://www.exploit-db.com/exploits/49474
exploitdb WORKING POC VERIFIED
by B3KC4T · pythonwebappsphp
https://www.exploit-db.com/exploits/49366
nomisec WORKING POC 5 stars
by Al1ex · poc
https://github.com/Al1ex/CVE-2020-35729
metasploit WORKING POC EXCELLENT
by b3kc4t, Metin Yunus Kandemir, bcoles · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/klog_server_authenticate_user_unauth_command_injection.rb

Nuclei Templates (1)

Klog Server <=2.41 - Unauthenticated Command Injection
CRITICALby dwisiswant0

Scores

CVSS v3 9.8
EPSS 0.8975
EPSS Percentile 99.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-78
Status published
Products (1)
klogserver/klog_server 2.4.1
Published Dec 27, 2020
Tracked Since Feb 18, 2026