CGI implementation in Yaws web server versions 1.81 to 2.0.7 is vulnerable to OS command injection.
https://www.debian.org/security/2020/dsa-4773
https://usn.ubuntu.com/4569-1/
https://lists.debian.org/debian-lts-announce/2020/09/msg00022.html
https://github.com/erlyaws/yaws/commits/master
https://vuln.be/post/yaws-xxe-and-shell-injections/
https://packetstormsecurity.com/files/159106/Yaws-2.0.7-XML-Injection-Command-Injection.html
https://github.com/vulnbe/poc-yaws-cgi-shell-injection
Source: Mitre, NVD
Published: 2020-09-09
Updated: 2024-11-21
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.39147