Description
Rapid7 Metasploit Framework versions before 5.0.85 suffers from an instance of CWE-78: OS Command Injection, wherein the libnotify plugin accepts untrusted user-supplied data via a remote computer's hostname or service name. An attacker can create a specially-crafted hostname or service name to be imported by Metasploit from a variety of sources and trigger a command injection on the operator's terminal. Note, only the Metasploit Framework and products that expose the plugin system is susceptible to this issue -- notably, this does not include Rapid7 Metasploit Pro. Also note, this vulnerability cannot be triggered through a normal scan operation -- the attacker would have to supply a file that is processed with the db_import command.
No analysis available yet.
Remediation
Vendor Solution
This issue is resolved in Metasploit Pro version 5.0.85
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
| Link | Providers |
|---|---|
| https://github.com/rapid7/metasploit-framework/issues/13026 |
|
History
No history.
Status: PUBLISHED
Assigner: rapid7
Published:
Updated: 2024-09-17T00:51:34.097Z
Reserved: 2020-01-21T00:00:00.000Z
Link: CVE-2020-7350
No data.
Status : Modified
Published: 2020-04-22T22:15:12.450
Modified: 2024-11-21T05:37:05.820
Link: CVE-2020-7350
No data.
OpenCVE Enrichment
No data.
Weaknesses