#VU24777 OS Command Injection in Ruckus R500 - CVE-2020-8438

 

#VU24777 OS Command Injection in Ruckus R500 - CVE-2020-8438

Published: January 30, 2020


Vulnerability identifier: #VU24777
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green
CVE-ID: CVE-2020-8438
CWE-ID: CWE-78
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Ruckus R500
Software vendor:
Ruckus Networks

Description

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to insufficient validation of user-supplied input in the hidden "/forms/nslookupHandler" form, as demonstrated by the "nslookuptarget=|cat${IFS}" substring. A remote administrator can execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

External links