Security Lab

OS Command Injection in Rapid7 Metasploit Framework

Дата публикации:24.04.2020
Всего просмотров:729
Опасность:
Высокая
Наличие исправления: Да
Количество уязвимостей:1
CVSSv3.1 рейтинг: 9.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE ID: CVE-2020-7350
Вектор эксплуатации: Удаленная
Воздействие: Компрометация системы
CWE ID: Нет данных
Наличие эксплоита: Нет данных
Уязвимые продукты: Metasploit Framework 4.x
Metasploit Framework 3.x
Metasploit Framework 2.x
Metasploit Framework
Уязвимые версии: Metasploit версии 5.0.84, 5.0.83, 5.0.82, 5.0.81, 5.0.80, 5.0.79, 5.0.78, 5.0.77, 5.0.76, 5.0.75, 5.0.74, 5.0.73, 5.0.72, 5.0.71, 4.17.103, 5.0.70, 4.17.102, 5.0.69, 4.17.101, 5.0.68, 4.17.100, 5.0.67, 5.0.66, 5.0.65, 5.0.64, 5.0.63, 5.0.62, 5.0.61, 5.0.60, 5.0.59, 5.0.58, 5.0.57, 5.0.56, 5.0.55, 5.0.54, 5.0.53, 5.0.52, 5.0.50, 5.0.49, 5.0.48, 5.0.47, 5.0.46, 5.0.45, 5.0.44, 5.0.43, 5.0.42, 5.0.41, 5.0.40, 5.0.39, 5.0.38, 5.0.37, 5.0.36, 5.0.35, 5.0.34, 5.0.32, 5.0.31, 5.0.30, 5.0.29, 5.0.28, 5.0.27, 5.0.26, 5.0.25, 5.0.24, 5.0.23, 5.0.22, 5.0.21, 5.0.20, 5.0.19, 5.0.18, 5.0.17, 5.0.16, 5.0.15, 5.0.14, 5.0.13, 5.0.12, 5.0.11, 5.0.10, 5.0.9, 5.0.8, 5.0.7, 5.0.6, 5.0.5, 5.0.4, 5.0.3, 5.0.2, 5.0.1, 5.0.0, 4.17.99, 4.17.98, 4.17.97, 4.17.96, 4.17.95, 4.17.94, 4.17.93, 4.17.92, 4.17.91, 4.17.90, 4.17.89, 4.17.88, 4.17.87, 4.17.86, 4.17.85, 4.17.84, 4.17.83, 4.17.82, 4.17.81, 4.17.80, 4.17.79, 4.17.78, 4.17.77, 4.17.76, 4.17.75, 4.17.74, 4.17.73, 4.17.72, 4.17.71, 4.17.70, 4.17.69, 4.17.68, 4.17.67, 4.17.66, 4.17.65, 4.17.64, 4.17.63, 4.17.62, 4.17.61, 4.17.60, 4.17.59, 4.17.58, 4.17.57, 4.17.56, 4.17.55, 4.17.54, 4.17.53, 4.17.52, 4.17.51, 4.17.50, 4.17.49, 4.17.48, 4.17.47, 4.17.46, 4.17.45, 4.17.44, 4.17.43, 4.17.42, 4.17.41, 4.17.40, 4.17.39, 4.17.38, 4.17.37, 4.17.36, 4.17.35, 4.17.34, 4.17.33, 4.17.32, 4.17.31, 4.17.30, 4.17.29, 4.17.28, 4.17.27, 4.17.26, 4.17.25, 4.17.24, 4.17.23, 4.17.22, 4.17.21, 4.17.20, 4.17.19, 4.17.18, 4.17.17, 4.17.16, 4.17.15, 4.17.14, 4.17.13, 4.17.12, 4.17.11, 4.17.10, 4.17.9, 4.17.8, 4.17.7, 4.17.6, 4.17.5, 4.17.4, 4.17.3, 4.17.2, 4.17.1, 4.17.0, 4.16.65, 4.16.64, 4.16.63, 4.16.62, 4.16.61, 4.16.60, 4.16.59, 4.16.58, 4.16.57, 4.16.56, 4.16.55, 4.16.54, 4.16.53, 4.16.52, 4.16.51, 4.16.50, 4.16.49, 4.16.48, 4.16.47, 4.16.46, 4.16.45, 4.16.44, 4.16.43, 4.16.42, 4.16.41, 4.16.40, 4.16.39, 4.16.38, 4.16.37, 4.16.36, 4.16.35, 4.16.34, 4.16.33, 4.16.32, 4.16.31, 4.16.30, 4.16.29, 4.16.28, 4.16.27, 4.16.26, 4.16.25, 4.16.24, 4.16.23, 4.16.22, 4.16.21, 4.16.20, 4.16.19, 4.16.18, 4.16.17, 4.16.16, 4.16.15, 4.16.14, 4.16.13, 4.16.12, 4.16.11, 4.16.10, 4.16.9, 4.16.8, 4.16.7, 4.16.6, 4.16.5, 4.16.4, 4.16.3, 4.16.2, 4.16.1, 4.16.0, 4.15.8, 4.15.7, 4.15.6, 4.15.5, 4.15.4, 4.15.3, 4.15.2, 4.15.1, 4.15.0, 4.14.28, 4.14.27, 4.14.26, 4.14.25, 4.14.24, 4.14.23, 4.14.22, 4.14.21, 4.14.20, 4.14.19, 4.14.18, 4.14.17, 4.14.16, 4.14.15, 4.14.14, 4.14.13, 4.14.12, 4.14.11, 4.14.10, 4.14.9, 4.14.8, 4.14.7, 4.14.6, 4.14.5, 4.14.4, 4.14.3, 4.14.2, 4.14.1, 4.14.0, 4.13.26, 4.13.25, 4.13.24, 4.13.23, 4.13.22, 4.13.21, 4.13.20, 4.13.19, 4.13.18, 4.13.17, 4.13.16, 4.13.15, 4.13.14, 4.13.13, 4.13.12, 4.13.11, 4.13.10, 4.13.9, 4.13.8, 4.13.7, 4.13.6, 4.13.5, 4.13.4, 4.13.3, 4.13.2, 4.13.1, 4.13.0, 4.12.42, 4.12.41, 4.12.40, 4.12.39, 4.12.38, 4.12.37, 4.12.36, 4.12.35, 4.12.34, 4.12.33, 4.12.32, 4.12.31, 4.12.30, 4.12.29, 4.12.28, 4.12.27, 4.12.26, 4.12.25, 4.12.24, 4.12.23, 4.12.22, 4.12.21, 4.12.20, 4.12.19, 4.12.18, 4.12.17, 4.12.16, 4.12.15, 4.12.14, 4.12.13, 4.12.12, 4.12.11, 4.12.10, 4.12.9, 4.12.8, 4.12.7, 4.12.6, 4.12.5, 4.12.4, 4.12.3, 4.12.2, 4.12.1, 4.12.0, 4.11.28, 4.11.27, 4.11.26, 4.11.25, 4.11.24, 4.11.23, 4.11.22, 4.11.21, 4.11.20, 4.11.19, 4.11.18, 4.11.17, 4.11.16, 4.11.15, 4.11.14, 4.11.13, 4.11.12, 4.11.11, 4.11.10, 4.11.9, 4.11.8, 4.11.7, 4.11.6, 4.11.4, 4.11.2, 4.11.1, 4.11.0, 4.10.2, 4.10.1, 4.10.0, 4.9.3, 4.9.2, 4.9.1, 4.9.0, 4.8.2, 4.8.1, 4.8.0, 4.7.2, 4.7.1, 4.7.0, 4.6.2, 4.6.1, 4.6.0, 4.5.3, 4.5.2, 4.5.1, 4.5.0, 4.4.0, 4.3.0, 4.2.0
Описание:

OS Command Injection in Rapid7 Metasploit Framework

URL производителя: https://www.rapid7.com/
Решение: Установите исправление с сайта производителя.
Ссылки: https://www.cybersecurity-help.cz/vdb/SB2020042411