Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-15121
HistoryJul 20, 2020 - 6:00 p.m.

CVE-2020-15121 Command injection in Radare2

2020-07-2018:00:25
CWE-78
GitHub_M
www.cve.org
2
radare2
command injection
cve-2020-15121
pdb server
shell code
executable
vulnerability

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N

AI Score

9.3

Confidence

High

EPSS

0.013

Percentile

85.8%

In radare2 before version 4.5.0, malformed PDB file names in the PDB server path cause shell injection. To trigger the problem it’s required to open the executable in radare2 and run idpd to trigger the download. The shell code will execute, and will create a file called pwned in the current directory.

CNA Affected

[
  {
    "product": "radare2",
    "vendor": "radareorg",
    "versions": [
      {
        "status": "affected",
        "version": "< 4.5.0"
      }
    ]
  }
]

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N

AI Score

9.3

Confidence

High

EPSS

0.013

Percentile

85.8%