2022-07-16 12:47:06 +00:00
id : CVE-2020-8654
2022-04-13 18:34:51 +00:00
info :
2022-09-29 13:38:41 +00:00
name : EyesOfNetwork 5.1-5.3 - SQL Injection/Remote Code Execution
2022-04-13 18:34:51 +00:00
author : praetorian-thendrickson
2022-09-29 13:52:24 +00:00
severity : high
2022-09-29 13:38:41 +00:00
description : EyesOfNetwork 5.1 to 5.3 contains SQL injection and remote code execution vulnerabilities. An attacker can possibly obtain sensitive information from a database, modify data, and execute unauthorized administrative operations in the context of the affected site. See also CVE-2020-8655, CVE-2020-8656, CVE-2020-8657, and CVE-2020-9465.
2022-07-16 12:47:06 +00:00
reference :
2022-04-15 12:20:32 +00:00
- https://github.com/h4knet/eonrce
2022-04-13 18:34:51 +00:00
- https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/eyesofnetwork_autodiscovery_rce.rb
2022-07-16 13:01:23 +00:00
- https://github.com/EyesOfNetworkCommunity/eonweb/issues/50
2022-09-29 13:38:41 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2020-8654
2022-07-16 13:01:23 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss-score : 8.8
cve-id : CVE-2020-8654
cwe-id : CWE-78
2023-07-15 16:29:17 +00:00
epss-score : 0.06956
2023-07-11 19:49:27 +00:00
cpe : cpe:2.3:a:eyesofnetwork:eyesofnetwork:5.3-0:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : eyesofnetwork
product : eyesofnetwork
tags : cisa,eyesofnetwork,rce,authenticated,msf,cve,cve2020
2022-07-16 12:47:06 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-04-13 18:34:51 +00:00
- method : GET
path :
- "{{BaseURL}}/css/eonweb.css"
2022-07-16 12:47:06 +00:00
matchers-condition : and
matchers :
- type : dsl
dsl :
- compare_versions(version, '< 5.4', '>= 5.1')
2022-04-13 18:34:51 +00:00
- type : word
part : body
words :
2022-07-16 12:47:06 +00:00
- "EyesOfNetwork"
2022-04-13 18:34:51 +00:00
- type : status
status :
2022-04-15 12:20:32 +00:00
- 200
2023-07-11 19:49:27 +00:00
extractors :
- type : regex
name : version
group : 1
regex :
- "# VERSION : ([0-9.]+)"
internal : true
part : body