.. / CVE-2020-13167

Exploit for Netsweeper <=6.4.3 - Python Code Injection (CVE-2020-13167)

Description:

Netsweeper through 6.4.3 allows unauthenticated remote code execution because webadmin/tools/unixlogin.php (with certain Referer headers) launches a command line with client-supplied parameters, and allows injection of shell metacharacters.

Nuclei Template

View the template here CVE-2020-13167.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2020/CVE-2020-13167.yaml
Copy

References:

https://github.com/Elsfa7-110/kenzer-templates
https://ssd-disclosure.com/ssd-advisory-netsweeper-preauth-rce/
https://github.com/ARPSyndicate/kenzer-templates
https://nvd.nist.gov/vuln/detail/CVE-2020-13167
https://portswigger.net/daily-swig/severe-rce-vulnerability-in-content-filtering-system-has-been-patched-netsweeper-says