Description
A vulnerability exists in RaspAP 2.6 to 2.6.5 in the "iface" GET parameter in /ajax/networking/get_netcfg.php, when the "iface" parameter value contains special characters such as ";" which enables an unauthenticated attacker to execute arbitrary OS commands.
References
https://gist.github.com/omriinbar/52c000c02a6992c6ce68d531195f69cf
https://github.com/RaspAP/raspap-webgui/blob/master/ajax/networking/get_netcfg.php
https://gist.github.com/omriinbar/52c000c02a6992c6ce68d531195f69cf
https://github.com/RaspAP/raspap-webgui/blob/master/ajax/networking/get_netcfg.php
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 · Critical
Information
Source identifier
Vulnerability status
Modified
Published
2021-06-09T16:15:08.677Z
4 years agoLast modified
2024-11-21T05:08:45.140Z
1 year ago