Lucene search

K
cve[email protected]CVE-2020-7387
HistoryJul 22, 2021 - 7:15 p.m.

CVE-2020-7387

2021-07-2219:15:08
CWE-200
web.nvd.nist.gov
81
4
cve-2020-7387
sage x3
installation path disclosure
adxdsrv.exe
rce
vulnerability
security
nvd

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

6.4 Medium

AI Score

Confidence

Low

0.196 Low

EPSS

Percentile

96.3%

Sage X3 Installation Pathname Disclosure. A specially crafted packet can elicit a response from the AdxDSrv.exe component that reveals the installation directory of the product. Note that this vulnerability can be combined with CVE-2020-7388 to achieve full RCE. This issue was fixed in AdxAdmin 93.2.53, which ships with updates for on-premises versions of Sage X3 Version 9 (components shipped with Syracuse 9.22.7.2 and later), Sage X3 HR & Payroll Version 9 (those components that ship with Syracuse 9.24.1.3), Version 11 (components shipped with Syracuse 11.25.2.6 and later), and Version 12 (components shipped with Syracuse 12.10.2.8 and later) of Sage X3. Other on-premises versions of Sage X3 are unsupported by the vendor.

Affected configurations

NVD
Node
sagex3Match9.0
OR
sagex3Match11.0
OR
sagex3Match12.0
OR
sagex3_hr_\&_payrollMatch9.0
AND
sageadxadminRange<93.2.53
CPENameOperatorVersion
sage:adxadminsage adxadminlt93.2.53

CNA Affected

[
  {
    "product": "X3",
    "vendor": "Sage",
    "versions": [
      {
        "lessThan": "AdxAdmin 93.2.53",
        "status": "affected",
        "version": "93.2.53",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

6.4 Medium

AI Score

Confidence

Low

0.196 Low

EPSS

Percentile

96.3%