From 775b18dfb21efffcbce98a6201e14de169e097e8 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 19 Apr 2022 21:56:21 +0000 Subject: [PATCH] Auto Generated CVE annotations [Tue Apr 19 21:56:21 UTC 2022] :robot: --- cves/2020/CVE-2020-7980.yaml | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/cves/2020/CVE-2020-7980.yaml b/cves/2020/CVE-2020-7980.yaml index d7db197650..8818e5d679 100644 --- a/cves/2020/CVE-2020-7980.yaml +++ b/cves/2020/CVE-2020-7980.yaml @@ -9,6 +9,12 @@ info: metadata: shodan-query: http.title:"Intellian Aptus Web" tags: satellian,rce,cve,cve2020,intellian,aptus + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-7980 + cwe-id: CWE-78 + description: "Intellian Aptus Web 1.24 allows remote attackers to execute arbitrary OS commands via the Q field within JSON data to the cgi-bin/libagent.cgi URI. NOTE: a valid sid cookie for a login to the intellian default account might be needed." requests: - raw: