An issue was discovered in Ozeki NG SMS Gateway through 4.17.6. It stores SMS messages in .NET serialized format on the filesystem. By generating (and writing to the disk) malicious .NET serialized files, an attacker can trick the product into deserializing them, resulting in arbitrary code execution.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.ozeki.hu/index.php?owpn=231 | Vendor Advisory | 
| https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14030-RCE%20via%20.NET%20Deserialization-Ozeki%20SMS%20Gateway | Patch Third Party Advisory | 
| http://www.ozeki.hu/index.php?owpn=231 | Vendor Advisory | 
| https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14030-RCE%20via%20.NET%20Deserialization-Ozeki%20SMS%20Gateway | Patch Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 05:02
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.ozeki.hu/index.php?owpn=231 - Vendor Advisory | |
| References | () https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14030-RCE%20via%20.NET%20Deserialization-Ozeki%20SMS%20Gateway - Patch, Third Party Advisory | 
Information
                Published : 2020-09-30 18:15
Updated : 2024-11-21 05:02
NVD link : CVE-2020-14030
Mitre link : CVE-2020-14030
CVE.ORG link : CVE-2020-14030
JSON object : View
Products Affected
                ozeki
- ozeki_ng_sms_gateway
 
CWE
                
                    
                        
                        CWE-502
                        
            Deserialization of Untrusted Data
