This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: OCS Inventory NG v2.7 suffers from **Remote Command Execution (RCE)**. The `get_mib_oid` function fails to sanitize the `mib_file` input in `ms_snmp_config.php`.β¦
π¦ **Affected**: **OCS Inventory NG Version 2.7**. Specifically, the component `plugins/main_sections/ms_config/ms_snmp_config.php` is the entry point for this vulnerability.β¦
π **Attacker Capabilities**: Full **Remote Command Execution**. Hackers can run commands with the privileges of the web server process (e.g., www-data or root).β¦
π₯ **Public Exploit**: **YES**. A dedicated exploit is available on GitHub (`mhaskar/CVE-2020-14947`). Proof-of-Concept (PoC) code and detailed guides are publicly shared, making exploitation accessible to non-experts. π
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for **OCS Inventory NG v2.7**. Look for the presence of the file `plugins/main_sections/ms_config/ms_snmp_config.php`.β¦
π§ **No Patch Workaround**: If patching is delayed, **disable the SNMP configuration module** or restrict access to `ms_snmp_config.php` via WAF rules.β¦
π¨ **Urgency**: **CRITICAL**. This is a confirmed RCE with public exploits. It was published in June 2020, but any unpatched instance remains at immediate risk.β¦