{"api_version":"1","generated_at":"2026-04-23T04:10:10+00:00","cve":"CVE-2020-7361","urls":{"html":"https://cve.report/CVE-2020-7361","api":"https://cve.report/api/cve/CVE-2020-7361.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-7361","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-7361"},"summary":{"title":"CVE-2020-7361","description":"The EasyCorp ZenTao Pro application suffers from an OS command injection vulnerability in its '/pro/repo-create.html' component. After authenticating to the ZenTao dashboard, attackers may construct and send arbitrary OS commands via the POST parameter 'path', and those commands will run in an elevated SYSTEM context on the underlying Windows operating system.","state":"PUBLIC","assigner":"cve@rapid7.com","published_at":"2020-08-06 16:15:00","updated_at":"2020-08-10 16:57:00"},"problem_types":["CWE-78"],"metrics":[],"references":[{"url":"https://github.com/rapid7/metasploit-framework/pull/13828","name":"https://github.com/rapid7/metasploit-framework/pull/13828","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"Add ZenTao Pro 8.8.2 Remote Code Execution module and docs by kalba-security · Pull Request #13828 · rapid7/metasploit-framework · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-7361","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7361","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"This issue was discovered by Daniel Monzón.","lang":""}],"nvd_cpes":[{"cve_year":"2020","cve_id":"7361","vulnerable":"1","versionEndIncluding":"8.8.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easycorp","cpe5":"zentao_pro","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@rapid7.com","DATE_PUBLIC":"2020-07-08T19:28:00.000Z","ID":"CVE-2020-7361","STATE":"PUBLIC","TITLE":"ZenTao Pro Command Injection"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"ZenTao Pro","version":{"version_data":[{"version_affected":"<=","version_name":"8.8.2","version_value":"8.8.2"}]}}]},"vendor_name":"EasyCorp"}]}},"credit":[{"lang":"eng","value":"This issue was discovered by Daniel Monzón."}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The EasyCorp ZenTao Pro application suffers from an OS command injection vulnerability in its '/pro/repo-create.html' component. After authenticating to the ZenTao dashboard, attackers may construct and send arbitrary OS commands via the POST parameter 'path', and those commands will run in an elevated SYSTEM context on the underlying Windows operating system."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":9.6,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-78 OS Command Injection"}]}]},"references":{"reference_data":[{"name":"https://github.com/rapid7/metasploit-framework/pull/13828","refsource":"MISC","url":"https://github.com/rapid7/metasploit-framework/pull/13828"}]},"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2020-08-06 16:15:00","lastModifiedDate":"2020-08-10 16:57:00","problem_types":["CWE-78"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":9},"severity":"HIGH","exploitabilityScore":8,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:easycorp:zentao_pro:*:*:*:*:*:*:*:*","versionEndIncluding":"8.8.2","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"7361","Ordinal":"167640","Title":"CVE-2020-7361","CVE":"CVE-2020-7361","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"7361","Ordinal":"1","NoteData":"The EasyCorp ZenTao Pro application suffers from an OS command injection vulnerability in its '/pro/repo-create.html' component. After authenticating to the ZenTao dashboard, attackers may construct and send arbitrary OS commands via the POST parameter 'path', and those commands will run in an elevated SYSTEM context on the underlying Windows operating system.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"7361","Ordinal":"2","NoteData":"2020-08-06","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"7361","Ordinal":"3","NoteData":"2020-08-06","Type":"Other","Title":"Modified"}]}}}