Vulnerability Description
An issue was discovered in the firewall3 component in Inteno IOPSYS 1.0 through 3.16. The attacker must make a JSON-RPC method call to add a firewall rule as an "include" and point the "path" argument to a malicious script or binary. This gets executed as root when the firewall changes are committed.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Inteno | Iopsys | >= 1.0, <= 3.16 |
Related Weaknesses (CWE)
References
- http://public.inteno.se/?p=feed-inteno-openwrt.git%3Ba=commit%3Bh=e6159ca928d7f0
- https://neonsea.uk/blog/2018/12/26/firewall-includes.htmlExploitThird Party Advisory
- http://public.inteno.se/?p=feed-inteno-openwrt.git%3Ba=commit%3Bh=e6159ca928d7f0
- https://neonsea.uk/blog/2018/12/26/firewall-includes.htmlExploitThird Party Advisory
FAQ
What is CVE-2018-20487?
CVE-2018-20487 is a vulnerability with a CVSS score of 8.8 (HIGH). An issue was discovered in the firewall3 component in Inteno IOPSYS 1.0 through 3.16. The attacker must make a JSON-RPC method call to add a firewall rule as an "include" and point the "path" argument...
How severe is CVE-2018-20487?
CVE-2018-20487 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-20487?
Check the references section above for vendor advisories and patch information. Affected products include: Inteno Iopsys.