{"api_version":"1","generated_at":"2026-04-23T08:04:31+00:00","cve":"CVE-2020-5632","urls":{"html":"https://cve.report/CVE-2020-5632","api":"https://cve.report/api/cve/CVE-2020-5632.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-5632","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-5632"},"summary":{"title":"CVE-2020-5632","description":"InfoCage SiteShell series (Host type SiteShell for IIS V1.4, V1.5, and V1.6, Host type SiteShell for IIS prior to revision V2.0.0.6, V2.1.0.7, V2.1.1.6, V3.0.0.11, V4.0.0.6, V4.1.0.5, and V4.2.0.1, Host type SiteShell for Apache Windows V1.4, V1.5, and V1.6, and Host type SiteShell for Apache Windows prior to revision V2.0.0.6, V2.1.0.7, V2.1.1.6, V3.0.0.11, V4.0.0.6, V4.1.0.5, and V4.2.0.1) allow authenticated attackers to bypass access restriction and to execute arbitrary code with an elevated privilege via a specially crafted executable files.","state":"PUBLIC","assigner":"vultures@jpcert.or.jp","published_at":"2020-10-06 06:15:00","updated_at":"2020-10-22 19:04:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://jpn.nec.com/infocage/siteshell/everyone_20200918.html","name":"https://jpn.nec.com/infocage/siteshell/everyone_20200918.html","refsource":"MISC","tags":["Vendor Advisory"],"title":"インストールしたファイルに Everyone による変更権限が付与される際のInfoCage SiteShellの対応について: Webアプリケーションファイアウォール(WAF) InfoCage SiteShell | NEC","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://jvn.jp/en/jp/JVN07426151/index.html","name":"https://jvn.jp/en/jp/JVN07426151/index.html","refsource":"MISC","tags":["Third Party Advisory"],"title":"JVN#07426151: InfoCage SiteShell installs their files with improper access permissions","mime":"text/xml","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-5632","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5632","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"5632","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nec","cpe5":"infocage_siteshell","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"apache_windows","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5632","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nec","cpe5":"infocage_siteshell","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"iis","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5632","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nec","cpe5":"infocage_siteshell","cpe6":"1.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"apache_windows","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5632","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nec","cpe5":"infocage_siteshell","cpe6":"1.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"iis","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5632","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nec","cpe5":"infocage_siteshell","cpe6":"1.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"apache_windows","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5632","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nec","cpe5":"infocage_siteshell","cpe6":"1.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"iis","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5632","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nec","cpe5":"infocage_siteshell","cpe6":"1.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"apache_windows","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5632","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nec","cpe5":"infocage_siteshell","cpe6":"1.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"iis","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5632","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nec","cpe5":"infocage_siteshell","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"apache_windows","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5632","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nec","cpe5":"infocage_siteshell","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"iis","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5632","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nec","cpe5":"infocage_siteshell","cpe6":"1.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"apache_windows","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5632","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nec","cpe5":"infocage_siteshell","cpe6":"1.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"iis","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5632","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nec","cpe5":"infocage_siteshell","cpe6":"1.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"apache_windows","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5632","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nec","cpe5":"infocage_siteshell","cpe6":"1.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"iis","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5632","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nec","cpe5":"infocage_siteshell","cpe6":"1.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"apache_windows","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5632","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nec","cpe5":"infocage_siteshell","cpe6":"1.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"iis","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2020-5632","ASSIGNER":"vultures@jpcert.or.jp","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"NEC Corporation","product":{"product_data":[{"product_name":"InfoCage SiteShell series","version":{"version_data":[{"version_value":"Host type SiteShell for IIS V1.4, V1.5, and V1.6, Host type SiteShell for IIS prior to revision V2.0.0.6, V2.1.0.7, V2.1.1.6, V3.0.0.11, V4.0.0.6, V4.1.0.5, and V4.2.0.1, Host type SiteShell for Apache Windows V1.4, V1.5, and V1.6, and Host type SiteShell for Apache Windows prior to revision V2.0.0.6, V2.1.0.7, V2.1.1.6, V3.0.0.11, V4.0.0.6, V4.1.0.5, and V4.2.0.1"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Fails to restrict access"}]}]},"references":{"reference_data":[{"url":"https://jpn.nec.com/infocage/siteshell/everyone_20200918.html","refsource":"MISC","name":"https://jpn.nec.com/infocage/siteshell/everyone_20200918.html"},{"url":"https://jvn.jp/en/jp/JVN07426151/index.html","refsource":"MISC","name":"https://jvn.jp/en/jp/JVN07426151/index.html"}]},"description":{"description_data":[{"lang":"eng","value":"InfoCage SiteShell series (Host type SiteShell for IIS V1.4, V1.5, and V1.6, Host type SiteShell for IIS prior to revision V2.0.0.6, V2.1.0.7, V2.1.1.6, V3.0.0.11, V4.0.0.6, V4.1.0.5, and V4.2.0.1, Host type SiteShell for Apache Windows V1.4, V1.5, and V1.6, and Host type SiteShell for Apache Windows prior to revision V2.0.0.6, V2.1.0.7, V2.1.1.6, V3.0.0.11, V4.0.0.6, V4.1.0.5, and V4.2.0.1) allow authenticated attackers to bypass access restriction and to execute arbitrary code with an elevated privilege via a specially crafted executable files."}]}},"nvd":{"publishedDate":"2020-10-06 06:15:00","lastModifiedDate":"2020-10-22 19:04:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":7.2},"severity":"HIGH","exploitabilityScore":3.9,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nec:infocage_siteshell:1.4:*:*:*:*:iis:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nec:infocage_siteshell:1.5:*:*:*:*:iis:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nec:infocage_siteshell:1.6:*:*:*:*:iis:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nec:infocage_siteshell:1.4:*:*:*:*:apache_windows:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nec:infocage_siteshell:1.5:*:*:*:*:apache_windows:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nec:infocage_siteshell:1.6:*:*:*:*:apache_windows:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:iis:*:*","versionStartIncluding":"2.0.0.0","versionEndExcluding":"2.0.0.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:iis:*:*","versionStartIncluding":"4.2.0.0","versionEndExcluding":"4.2.0.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:iis:*:*","versionStartIncluding":"4.1.0.0","versionEndExcluding":"4.1.0.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:iis:*:*","versionStartIncluding":"4.0.0.0","versionEndExcluding":"4.0.0.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:iis:*:*","versionStartIncluding":"3.0.0.0","versionEndExcluding":"3.0.0.11","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:apache_windows:*:*","versionStartIncluding":"2.1.0.0","versionEndExcluding":"2.1.0.7","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:apache_windows:*:*","versionEndExcluding":"2.0.0.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:apache_windows:*:*","versionStartIncluding":"4.1.0.0","versionEndExcluding":"4.1.0.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:apache_windows:*:*","versionStartIncluding":"4.0.0.0","versionEndExcluding":"4.0.0.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:apache_windows:*:*","versionStartIncluding":"3.0.0.0","versionEndExcluding":"3.0.0.11","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:apache_windows:*:*","versionStartIncluding":"4.2.0.0","versionEndExcluding":"4.2.0.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:apache_windows:*:*","versionStartIncluding":"2.1.1.0","versionEndExcluding":"2.1.1.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:iis:*:*","versionStartIncluding":"2.1.1.0","versionEndExcluding":"2.1.1.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:iis:*:*","versionStartIncluding":"2.1.0.0","versionEndExcluding":"2.1.0.7","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"5632","Ordinal":"165878","Title":"CVE-2020-5632","CVE":"CVE-2020-5632","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"5632","Ordinal":"1","NoteData":"InfoCage SiteShell series (Host type SiteShell for IIS V1.4, V1.5, and V1.6, Host type SiteShell for IIS prior to revision V2.0.0.6, V2.1.0.7, V2.1.1.6, V3.0.0.11, V4.0.0.6, V4.1.0.5, and V4.2.0.1, Host type SiteShell for Apache Windows V1.4, V1.5, and V1.6, and Host type SiteShell for Apache Windows prior to revision V2.0.0.6, V2.1.0.7, V2.1.1.6, V3.0.0.11, V4.0.0.6, V4.1.0.5, and V4.2.0.1) allow authenticated attackers to bypass access restriction and to execute arbitrary code with an elevated privilege via a specially crafted executable files.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"5632","Ordinal":"2","NoteData":"2020-10-06","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"5632","Ordinal":"3","NoteData":"2020-10-06","Type":"Other","Title":"Modified"}]}}}