CVE-2020-14293
📋 TL;DR
CVE-2020-14293 is an OS command injection vulnerability in Secudos DOMOS 5.8 that allows remote attackers to execute arbitrary commands as root via shell metacharacters in the zone field. This affects organizations using DOMOS 5.8 for file transfer solutions, potentially compromising entire systems.
💻 Affected Systems
- Secudos DOMOS
📦 What is this software?
Domos by Secudos
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with root-level access, data exfiltration, lateral movement, and persistent backdoor installation
Likely Case
Remote code execution leading to data theft, system manipulation, and potential ransomware deployment
If Mitigated
Limited impact with proper network segmentation and access controls, but still significant risk due to root privileges
🎯 Exploit Status
Public exploit code available on GitHub, simple injection via web form field
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: DOMOS 5.9
Vendor Advisory: https://www.secudos.de/en/news-en/domos-release-5-9
Restart Required: Yes
Instructions:
1. Backup current configuration. 2. Download DOMOS 5.9 from vendor portal. 3. Apply update following vendor documentation. 4. Restart DOMOS services. 5. Verify functionality.
🔧 Temporary Workarounds
Network Access Restriction
linuxRestrict access to DOMOS web interface to trusted IP addresses only
iptables -A INPUT -p tcp --dport [DOMOS_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [DOMOS_PORT] -j DROP
Input Validation Proxy
allDeploy WAF or reverse proxy to filter malicious input to zone parameter
🧯 If You Can't Patch
- Immediately restrict network access to DOMOS interface using firewall rules
- Monitor for unusual process execution and network connections from DOMOS server
🔍 How to Verify
Check if Vulnerable:
Check DOMOS version via web interface admin panel or system logs for version 5.8 or earlier
Check Version:
grep -i domos /var/log/syslog* || check web interface admin panel
Verify Fix Applied:
Verify version shows 5.9 or later in admin interface and test zone field input validation
📡 Detection & Monitoring
Log Indicators:
- Unusual commands in system logs from DOMOS processes
- Multiple failed login attempts to DOMOS interface
- Suspicious process execution with root privileges
Network Indicators:
- Unexpected outbound connections from DOMOS server
- Traffic to known malicious IPs from DOMOS host
SIEM Query:
source="DOMOS" AND (process="sh" OR process="bash" OR process="python") AND user="root"
🔗 References
- http://seclists.org/fulldisclosure/2020/Sep/51
- https://github.com/patrickhener/CVE-2020-14293
- https://www.secudos.de/en/news-en/domos-release-5-9
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-025.txt
- https://www.syss.de/pentest-blog/syss-2020-024-und-syss-2020-025-zwei-schwachstellen-in-file-transfer-loesung-von-qiata
- http://seclists.org/fulldisclosure/2020/Sep/51
- https://github.com/patrickhener/CVE-2020-14293
- https://www.secudos.de/en/news-en/domos-release-5-9
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-025.txt
- https://www.syss.de/pentest-blog/syss-2020-024-und-syss-2020-025-zwei-schwachstellen-in-file-transfer-loesung-von-qiata