Vulnerability Description
A vulnerability in File Transfer Solution of Raonwiz could allow arbitrary command execution as the result of viewing a specially-crafted web page. This vulnerability is due to insufficient validation of the parameter of the specific method. An attacker could exploit this vulnerability by setting the parameter to the command they want to execute. A successful exploit could allow the attacker to execute arbitrary commands on a target system as the user. However, the victim must run the Internet Explorer browser with administrator privileges because of the cross-domain policy.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Raonwiz | Raon K Upload | < 2018.0.2.56 |
Related Weaknesses (CWE)
References
- http://www.raonk.com/page/customs/modify.aspx?pSeq=20&pageno=1Vendor Advisory
- https://boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36166Third Party Advisory
- http://www.raonk.com/page/customs/modify.aspx?pSeq=20&pageno=1Vendor Advisory
- https://boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36166Third Party Advisory
FAQ
What is CVE-2020-7863?
CVE-2020-7863 is a vulnerability with a CVSS score of 8.8 (HIGH). A vulnerability in File Transfer Solution of Raonwiz could allow arbitrary command execution as the result of viewing a specially-crafted web page. This vulnerability is due to insufficient validation...
How severe is CVE-2020-7863?
CVE-2020-7863 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-7863?
Check the references section above for vendor advisories and patch information. Affected products include: Raonwiz Raon K Upload.