CVE-2020-2008External Control of File Name or Path in Palo Alto Networks Pan-os

Severity
7.2HIGHNVD
EPSS
3.0%
top 13.43%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 13
Latest updateMay 24

Description

An OS command injection and external control of filename vulnerability in Palo Alto Networks PAN-OS allows authenticated administrators to execute code with root privileges or delete arbitrary system files and impact the system's integrity or cause a denial of service condition. This issue affects: All versions of PAN-OS 7.1 and 8.0; PAN-OS 8.1 versions earlier than 8.1.14.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 1.2 | Impact: 5.9

Affected Packages3 packages

CVEListV5palo_alto_networks/pan-os8.18.1.14+2
NVDpaloaltonetworks/pan-os7.1.07.1.26+2
Palo Altopaloalto/pan-os

🔴Vulnerability Details

2
GHSA
GHSA-r6cm-93j6-3mh3: An OS command injection and external control of filename vulnerability in Palo Alto Networks PAN-OS allows authenticated administrators to execute cod2022-05-24
CVEList
PAN-OS: OS command injection or arbitrary file deletion vulnerability2020-05-13

💥Exploits & PoCs

1
Exploit-DB
Rejetto HttpFileServer 2.3.x - Remote Command Execution (3)2020-11-30

📋Vendor Advisories

1
Palo Alto
PAN-OS: OS command injection or arbitrary file deletion vulnerability2020-05-13

🕵️Threat Intelligence

1
Unit42
Threat Brief: Microsoft DNS Server Wormable Vulnerability CVE-2020-13502020-07-21
CVE-2020-2008 — External Control of File Name or Path | cvebase