vendor:
Easywall
by:
Melvin Mejia
6.1
CVSS
HIGH
Remote Command Execution
78
CWE
Product Name: Easywall
Affected Version From: 2000.3.1
Affected Version To: 2000.3.1
Patch Exists: NO
Related CWE: CVE-2023-XXXX (Not real CVE, placeholder)
CPE: a:easywall:easywall:0.3.1
Metasploit:
https://www.rapid7.com/db/vulnerabilities/mediawiki-cve-2024-23174/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2022-43358/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-RHEL9-unaffected/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2022-23504/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-RHEL8-unaffected/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2017-14723/, https://www.rapid7.com/db/vulnerabilities/wordpress-cve-2017-14723/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/hpux-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp1-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/ibm-http_server-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/apache-httpd-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2017-9788/, https://www.rapid7.com/db/?q=placeholder)&type=&page=2, https://www.rapid7.com/db/?q=placeholder)&type=&page=2
Other Scripts:
https://www.infosecmatter.com/why-your-exploit-completed-but-no-session-was-created-try-these-fixes/, https://www.infosecmatter.com/nessus-plugin-library/?id=141474, https://www.infosecmatter.com/nessus-plugin-library/?id=75129, https://www.infosecmatter.com/nessus-plugin-library/?id=137370, https://www.infosecmatter.com/nessus-plugin-library/?id=148894, https://www.infosecmatter.com/nessus-plugin-library/?id=56177, https://www.infosecmatter.com/nessus-plugin-library/?id=12055, https://www.infosecmatter.com/metasploit-auxiliary-modules-detailed-spreadsheet/, https://www.infosecmatter.com/metasploit-module-library/?mm=post/multi/escalate/aws_create_iam_user, https://www.infosecmatter.com/nmap-nse-library/?nse=http-huawei-hg5xx-vuln, https://www.infosecmatter.com/metasploit-module-library/?mm=auxiliary/fileformat/badpdf, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/osx/local/feedback_assistant_root, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/osx/local/timemachine_cmd_injection, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/osx/browser/safari_in_operator_side_effect, https://www.infosecmatter.com/nessus-plugin-library/?id=146094, https://www.infosecmatter.com/nessus-plugin-library/?id=155955, https://www.infosecmatter.com/metasploit-module-library/?mm=post/multi/gather/unix_kerberos_tickets, https://www.infosecmatter.com/metasploit-module-library/?mm=evasion/windows/process_herpaderping, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/oracle/client_system_analyzer_upload, https://www.infosecmatter.com/metasploit-module-library/?mm=encoder/x86/opt_sub
Platforms Tested: Ubuntu 22.04
2023
Easywall 0.3.1 – Authenticated Remote Command Execution
The Easywall 0.3.1 software allows an authenticated user to execute arbitrary commands on the target system due to a command injection vulnerability in the 'port' parameter. By sending a specially crafted payload, an attacker can gain unauthorized access to the system.
Mitigation:
To mitigate this vulnerability, it is recommended to update to a patched version of the Easywall software. Additionally, input validation should be implemented to sanitize user-supplied data.