CVE-2017-9807
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
22/06/2017
Last modified:
20/04/2025
Description
An issue was discovered in the OpenWebif plugin through 1.2.4 for E2 open devices. The saveConfig function of "plugin/controllers/models/config.py" performs an eval() call on the contents of the "key" HTTP GET parameter. This allows an unauthenticated remote attacker to execute arbitrary Python code or OS commands via api/saveconfig.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:openwebif_project:openwebif:*:*:*:*:*:*:*:* | 1.2.4 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.openwall.com/lists/oss-security/2017/10/02/4
- http://www.securityfocus.com/bid/99232
- https://census-labs.com/news/2017/10/02/e2openplugin-openwebif-saveconfig-remote-code-execution/
- https://github.com/E2OpenPlugins/e2openplugin-OpenWebif/issues/620
- http://www.openwall.com/lists/oss-security/2017/10/02/4
- http://www.securityfocus.com/bid/99232
- https://census-labs.com/news/2017/10/02/e2openplugin-openwebif-saveconfig-remote-code-execution/
- https://github.com/E2OpenPlugins/e2openplugin-OpenWebif/issues/620