10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.614 Medium
EPSS
Percentile
97.8%
Severity: High
Date : 2020-09-26
CVE-ID : CVE-2020-12872 CVE-2020-24379 CVE-2020-24916
Package : yaws
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-1228
The package yaws before version 2.0.8-1 is vulnerable to multiple
issues including arbitrary command execution and information
disclosure.
Upgrade to 2.0.8-1.
The problems have been fixed upstream in version 2.0.8.
None.
yaws_config.erl in Yaws through 2.0.7 loads obsolete TLS ciphers, as
demonstrated by ones that allow Sweet32 attacks.
WebDAV implementation in Yaws web server versions 1.81 to 2.0.7 is
vulnerable to XXE injection.
CGI implementation in Yaws web server versions 1.81 to 2.0.7 is
vulnerable to OS command injection.
A remote attacker might be able to execute arbitrary commands,
downgrade TLS ciphers, or load foreign entities via crafted content.
https://github.com/erlyaws/yaws/releases/tag/yaws-2.0.8
https://vuln.be/post/yaws-xxe-and-shell-injections/
https://sweet32.info/
https://medium.com/@charlielabs101/cve-2020-12872-df315411aa70
https://packetstormsecurity.com/files/159106/Yaws-2.0.7-XML-Injection-Command-Injection.html
https://github.com/erlyaws/yaws/commit/05a06345012598f5da55dbb4d041c8dc26e88e6c
https://github.com/vulnbe/poc-yaws-dav-xxe
https://github.com/erlyaws/yaws/commit/799b3b526d15b7a9bc43ae97165aeb085f18fac1
https://github.com/vulnbe/poc-yaws-cgi-shell-injection
https://security.archlinux.org/CVE-2020-12872
https://security.archlinux.org/CVE-2020-24379
https://security.archlinux.org/CVE-2020-24916
github.com/erlyaws/yaws/commit/05a06345012598f5da55dbb4d041c8dc26e88e6c
github.com/erlyaws/yaws/commit/799b3b526d15b7a9bc43ae97165aeb085f18fac1
github.com/erlyaws/yaws/releases/tag/yaws-2.0.8
github.com/vulnbe/poc-yaws-cgi-shell-injection
github.com/vulnbe/poc-yaws-dav-xxe
medium.com/@charlielabs101/cve-2020-12872-df315411aa70
packetstormsecurity.com/files/159106/Yaws-2.0.7-XML-Injection-Command-Injection.html
security.archlinux.org/AVG-1228
security.archlinux.org/CVE-2020-12872
security.archlinux.org/CVE-2020-24379
security.archlinux.org/CVE-2020-24916
sweet32.info/
vuln.be/post/yaws-xxe-and-shell-injections/
10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.614 Medium
EPSS
Percentile
97.8%