Rapid7 Metasploit Framework versions before 5.0.85 suffers from an instance of CWE-78: OS Command Injection, wherein the libnotify plugin accepts untrusted user-supplied data via a remote computer's hostname or service name. An attacker can create a specially-crafted hostname or service name to be imported by Metasploit from a variety of sources and trigger a command injection on the operator's terminal. Note, only the Metasploit Framework and products that expose the plugin system is susceptible to this issue -- notably, this does not include Rapid7 Metasploit Pro. Also note, this vulnerability cannot be triggered through a normal scan operation -- the attacker would have to supply a file that is processed with the db_import command.
Advisories

No advisories yet.

Fixes

Solution

This issue is resolved in Metasploit Pro version 5.0.85


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: rapid7

Published:

Updated: 2024-09-17T00:51:34.097Z

Reserved: 2020-01-21T00:00:00

Link: CVE-2020-7350

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-04-22T22:15:12.450

Modified: 2024-11-21T05:37:05.820

Link: CVE-2020-7350

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses