HTTP: SCO Openserver OS Command Injection

This signature detects attempts to exploit a known vulnerability against SCO Openserver. A successful attack can lead to arbitrary code execution.

Extended Description

Xinuos (formerly SCO) Openserver v5 and v6 allows attackers to execute arbitrary commands via shell metacharacters in outputform or toclevels parameter to cgi-bin/printbook.

Affected Products

Xinuos openserver

References

CVE: CVE-2020-25494

Short Name
HTTP:CTS:SCO-OPNSRVR-OS-INJ
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2020-25494 Command Injection OS Openserver SCO
Release Date
10/05/2021
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3425
False Positive
Unknown
Vendors

Xinuos

CVSS Score

7.5

Found a potential security threat?