Vulnerability Description
AirControl 1.4.2 contains a pre-authentication remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary system commands through malicious Java expression injection. Attackers can exploit the /.seam endpoint by crafting a specially constructed URL with embedded Java expressions to run commands with the application's system privileges.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://www.exploit-db.com/exploits/48541
- https://www.ui.com/
- https://www.vulncheck.com/advisories/aircontrol-preauth-remote-code-execution
FAQ
What is CVE-2020-37052?
CVE-2020-37052 is a vulnerability with a CVSS score of 9.8 (CRITICAL). AirControl 1.4.2 contains a pre-authentication remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary system commands through malicious Java expression injectio...
How severe is CVE-2020-37052?
CVE-2020-37052 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-37052?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.