CVE-2020-2003External Control of File Name or Path in Palo Alto Networks Pan-os

Severity
6.5MEDIUMNVD
EPSS
0.3%
top 43.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 13
Latest updateMay 24

Description

An external control of filename vulnerability in the command processing of PAN-OS allows an authenticated administrator to delete arbitrary system files affecting the integrity of the system or causing denial of service to all PAN-OS services. This issue affects: All versions of PAN-OS 7.1 and 8.0; PAN-OS 8.1 versions before 8.1.14; PAN-OS 9.0 versions before 9.0.7; PAN-OS 9.1 versions before 9.1.1.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:HExploitability: 1.2 | Impact: 5.2

Affected Packages3 packages

NVDpaloaltonetworks/pan-os9.1.09.1.1+4
CVEListV5palo_alto_networks/pan-os8.18.1.14+4
Palo Altopaloalto/pan-os

🔴Vulnerability Details

2
GHSA
GHSA-4387-mfcp-5cpf: An external control of filename vulnerability in the command processing of PAN-OS allows an authenticated administrator to delete arbitrary system fil2022-05-24
CVEList
PAN-OS: Authenticated administrator can delete arbitrary system file2020-05-13

💥Exploits & PoCs

2
Exploit-DB
GUnet OpenEclass 1.7.3 E-learning platform - 'month' SQL Injection2020-03-03
Exploit-DB
HP Operations Agent - Opcode 'coda.exe' 0x8c Buffer Overflow (Metasploit)2012-10-29

📋Vendor Advisories

1
Palo Alto
PAN-OS: Authenticated administrator can delete arbitrary system file2020-05-13

💬Community

2
HackerOne
IP-in-IP protocol routes arbitrary traffic by default - CVE-2020-101362021-08-15
Bugzilla
CVE-2015-9541 qt: XML entity expansion vulnerability2020-02-10
CVE-2020-2003 — External Control of File Name or Path | cvebase