6.5
CVSSv2

CVE-2020-14950

Published: 21/06/2020 Updated: 21/07/2021
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

aaPanel up to and including 6.6.6 allows remote authenticated users to execute arbitrary commands via shell metacharacters in a modified /system?action=ServiceAdmin request (start, stop, or restart) to the setting menu of Sotfware Store.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

aapanel aapanel

Github Repositories

aapanel 6.6.6 - (Authenticated) Remote Code Execution

aapanel aapanel 666 - CVE-2020-14950 Description : allows remote authenticated users to execute arbitrary commands via the setting menu of Sotfware Store Affected version : All <= 666 Information To make this PoC, I just installed the software using docker-compose Vulnerability Type : Remote command execution (Authenticated RCE) POC Go to Software Store, click o