openmediavault before 4.1.36 and 5.x before 5.5.12 allows authenticated PHP code injection attacks, via the sortfield POST parameter of rpc.php, because json_encode_safe is not used in config/databasebackend.inc. Successful exploitation allows arbitrary command execution on the underlying operating system as root.
                
            References
                    | Link | Resource | 
|---|---|
| http://packetstormsecurity.com/files/160223/OpenMediaVault-rpc.php-Authenticated-PHP-Code-Injection.html | Exploit Third Party Advisory VDB Entry | 
| https://github.com/openmediavault/openmediavault/commit/ebb51bbf5a39f4955eab0073bf87f2a31926d85d | Patch Third Party Advisory | 
| https://www.openmediavault.org/?p=2797 | Vendor Advisory | 
| http://packetstormsecurity.com/files/160223/OpenMediaVault-rpc.php-Authenticated-PHP-Code-Injection.html | Exploit Third Party Advisory VDB Entry | 
| https://github.com/openmediavault/openmediavault/commit/ebb51bbf5a39f4955eab0073bf87f2a31926d85d | Patch Third Party Advisory | 
| https://www.openmediavault.org/?p=2797 | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    No history.
Information
                Published : 2020-10-02 09:15
Updated : 2024-11-21 05:19
NVD link : CVE-2020-26124
Mitre link : CVE-2020-26124
CVE.ORG link : CVE-2020-26124
JSON object : View
Products Affected
                openmediavault
- openmediavault
 
CWE
                
                    
                        
                        CWE-94
                        
            Improper Control of Generation of Code ('Code Injection')
