{ "Name": "Netsweeper Webadmin unixlogin.php RCE (CVE-2020-13167)", "Description": "Netsweeper through 6.4.3 allows unauthenticated remote code execution because webadmin/tools/unixlogin.php (with certain Referer headers) launches a command line with client-supplied parameters, and allows injection of shell metacharacters.", "Product": "netsweeper", "Homepage": "https://www.netsweeper.com/", "DisclosureDate": "2021-05-27", "Author": "李大壮", "GobyQuery": "title=\"netsweeper\" && body=\"webAdmin\"", "FofaQuery": "title=\"netsweeper\" && body=\"webAdmin\"", "Level": "3", "Impact": "

Netsweeper through 6.4.3 allows unauthenticated remote code execution because webadmin/tools/unixlogin.php (with certain Referer headers) launches a command line with client-supplied parameters, and allows injection of shell metacharacters.

", "Recommendation": "

1. Intercept access to the /webadmin/tools/unixlogin.php directory

2. Update Patches

", "References": [ "https://ssd-disclosure.com/ssd-advisory-netsweeper-preauth-rce/", "https://nvd.nist.gov/vuln/detail/CVE-2020-13167", "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13167" ], "HasExp": true, "ExpParams": [ { "name": "cmd", "type": "input", "value": "whoami" } ], "ExpTips": { "Type": "", "Content": "" }, "ScanSteps": [ "AND" ], "ExploitSteps": null, "Tags": [ "RCE" ], "CVEIDs": [ "CVE-2020-13167" ], "CVSSScore": "9.8", "AttackSurfaces": { "Application": [ "netsweeper" ], "Support": null, "Service": null, "System": null, "Hardware": null } }