Vulnerability Description
InfoCage SiteShell series (Host type SiteShell for IIS V1.4, V1.5, and V1.6, Host type SiteShell for IIS prior to revision V2.0.0.6, V2.1.0.7, V2.1.1.6, V3.0.0.11, V4.0.0.6, V4.1.0.5, and V4.2.0.1, Host type SiteShell for Apache Windows V1.4, V1.5, and V1.6, and Host type SiteShell for Apache Windows prior to revision V2.0.0.6, V2.1.0.7, V2.1.1.6, V3.0.0.11, V4.0.0.6, V4.1.0.5, and V4.2.0.1) allow authenticated attackers to bypass access restriction and to execute arbitrary code with an elevated privilege via a specially crafted executable files.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nec | Infocage Siteshell | < 2.0.0.6 |
References
- https://jpn.nec.com/infocage/siteshell/everyone_20200918.htmlVendor Advisory
- https://jvn.jp/en/jp/JVN07426151/index.htmlThird Party Advisory
- https://jpn.nec.com/infocage/siteshell/everyone_20200918.htmlVendor Advisory
- https://jvn.jp/en/jp/JVN07426151/index.htmlThird Party Advisory
FAQ
What is CVE-2020-5632?
CVE-2020-5632 is a vulnerability with a CVSS score of 7.8 (HIGH). InfoCage SiteShell series (Host type SiteShell for IIS V1.4, V1.5, and V1.6, Host type SiteShell for IIS prior to revision V2.0.0.6, V2.1.0.7, V2.1.1.6, V3.0.0.11, V4.0.0.6, V4.1.0.5, and V4.2.0.1, Ho...
How severe is CVE-2020-5632?
CVE-2020-5632 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-5632?
Check the references section above for vendor advisories and patch information. Affected products include: Nec Infocage Siteshell.