CVE-2020-12736

7.2 HIGH

📋 TL;DR

CVE-2020-12736 is a server-side template injection vulnerability in Code42 on-premises servers that allows remote code execution. When administrators create local users via email invitations and modify the email subject line with template language code, malicious code can be executed on the server. This affects Code42 environments with server versions 7.0.4 and earlier.

💻 Affected Systems

Products:
  • Code42 CrashPlan
  • Code42 Incydr
  • Code42 environments with on-premises server
Versions: 7.0.4 and earlier
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects on-premises deployments, not cloud/SaaS versions. Requires administrator privileges to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise allowing attacker to execute arbitrary code with server privileges, potentially leading to data exfiltration, lateral movement, or ransomware deployment.

🟠

Likely Case

Administrator credentials compromise leading to unauthorized access to sensitive backup data and potential data theft.

🟢

If Mitigated

Limited impact if proper input validation and least privilege principles are followed, with only authorized administrators able to trigger the vulnerability.

🌐 Internet-Facing: MEDIUM - Requires administrator access to exploit, but if admin portal is internet-facing, risk increases significantly.
🏢 Internal Only: HIGH - Internal administrators with access to user management functions can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Simple template injection once administrator access is obtained.

Exploitation requires administrator privileges to access the user invitation functionality.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.0.5 and later

Vendor Advisory: https://code42.com/r/support/CVE-2020-12736

Restart Required: Yes

Instructions:

1. Download Code42 server version 7.0.5 or later from official vendor sources. 2. Backup current configuration and data. 3. Install the update following vendor documentation. 4. Restart Code42 services. 5. Verify functionality post-update.

🔧 Temporary Workarounds

Disable local user creation via email

all

Prevent administrators from creating local users via email invitations to eliminate the attack vector.

Configure via Code42 admin console: Settings > User Management > Disable email invitations for local users

Implement input validation

all

Add server-side input validation to sanitize email subject content before processing.

Implement template language escaping in email generation services

🧯 If You Can't Patch

  • Restrict administrator access to only trusted personnel and implement multi-factor authentication
  • Monitor and audit all user creation activities, especially email invitation modifications

🔍 How to Verify

Check if Vulnerable:

Check Code42 server version via admin console or command line. Versions 7.0.4 and earlier are vulnerable.

Check Version:

On Linux: /usr/local/crashplan/bin/CrashPlanEngine -v | grep version
On Windows: Check version in Control Panel > Programs > Code42

Verify Fix Applied:

Verify server version is 7.0.5 or later and test that template injection in email subject no longer executes code.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrator activity creating users with modified email subjects
  • Template language patterns in email generation logs
  • Unexpected process execution from Code42 services

Network Indicators:

  • Unusual outbound connections from Code42 server
  • Suspicious payloads in HTTP requests to user management endpoints

SIEM Query:

source="code42" AND (event="user_creation" OR event="email_invitation") AND subject CONTAINS "$" OR subject CONTAINS "#"

🔗 References

📤 Share & Export