Vulnerability Description
Rapid7's Metasploit msfvenom framework handles APK files in a way that allows for a malicious user to craft and publish a file that would execute arbitrary commands on a victim's machine.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rapid7 | Metasploit | < 4.19.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/160004/Rapid7-Metasploit-Framework-msfvenomExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/161200/Metasploit-Framework-6.0.11-Command-ExploitThird Party AdvisoryVDB Entry
- https://github.com/rapid7/metasploit-framework/pull/14288ExploitPatchThird Party Advisory
- http://packetstormsecurity.com/files/160004/Rapid7-Metasploit-Framework-msfvenomExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/161200/Metasploit-Framework-6.0.11-Command-ExploitThird Party AdvisoryVDB Entry
- https://github.com/rapid7/metasploit-framework/pull/14288ExploitPatchThird Party Advisory
FAQ
What is CVE-2020-7384?
CVE-2020-7384 is a vulnerability with a CVSS score of 7.0 (HIGH). Rapid7's Metasploit msfvenom framework handles APK files in a way that allows for a malicious user to craft and publish a file that would execute arbitrary commands on a victim's machine.
How severe is CVE-2020-7384?
CVE-2020-7384 has been rated HIGH with a CVSS base score of 7.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-7384?
Check the references section above for vendor advisories and patch information. Affected products include: Rapid7 Metasploit.