## https://sploitus.com/exploit?id=SAINT:74C0293BF5130A596F2DA5BDCEF8CDFC
Added: 04/30/2020
CVE: CVE-2020-5847
### Background
Unraid is a network-attached storage operating system. It runs a web-based graphical user interface (webGui) written in PHP.
### Problem
The Unraid webGui uses the PHP `**extract**` function to load all GET parameters into the application as variables, allowing a remote user to control any program variable, leading to command execution.
### Resolution
Upgrade to Unraid 6.8.1 or higher.
### References
https://sysdream.com/news/lab/2020-02-06-cve-2020-5847-cve-2020-5849-unraid-6-8-0-unauthenticated-remote-code-execution-as-root/