CVE-2020-25134
moderate-risk
Published 2020-09-25
An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to directory traversal and local file inclusion due to the fact that there is an unrestricted possibility of loading any file with an inc.php extension. Inclusion of other files (even though limited to the mentioned extension) can lead to Remote Code Execution. This can occur via /settings/?format=../ URIs to pages/settings.inc.php.
Do I need to act?
~
3.5% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Vendors
References (2)
Third Party Advisory
https://gist.github.com/mariuszpoplawski/a3d18fc3d7113cf9c004161ebd9420c9
Third Party Advisory
https://gist.github.com/mariuszpoplawski/a3d18fc3d7113cf9c004161ebd9420c9
46
/ 100
moderate-risk
Severity
30/34 · Critical
Exploitability
7/34 · Low
Exposure
9/34 · Low