Kirona Dynamic Resource Scheduler - Information Disclosure
ID: CVE-2019-17503
Severity: medium
Author: LogicalHunter
Tags: cve,cve2019,exposure,edb,packetstorm,kirona
Description
Section titled “Description”Kirona Dynamic Resource Scheduler is susceptible to information disclosure. An unauthenticated user can directly access /osm/REGISTER.cmd (aka /osm_tiles/REGISTER.cmd), which contains sensitive information with exposed SQL queries, such as database version, table name, and column name.
YAML Source
Section titled “YAML Source”id: CVE-2019-17503
info: name: Kirona Dynamic Resource Scheduler - Information Disclosure author: LogicalHunter severity: medium description: Kirona Dynamic Resource Scheduler is susceptible to information disclosure. An unauthenticated user can directly access /osm/REGISTER.cmd (aka /osm_tiles/REGISTER.cmd), which contains sensitive information with exposed SQL queries, such as database version, table name, and column name. remediation: | Apply the latest patch or update provided by the vendor to fix the information disclosure vulnerability. reference: - https://www.exploit-db.com/exploits/47498 - https://github.com/Ramikan/Vulnerabilities/blob/master/Kirona-DRS%205.5.3.5%20Multiple%20Vulnerabilities - http://packetstormsecurity.com/files/154838/Kirona-DRS-5.5.3.5-Information-Disclosure.html - https://nvd.nist.gov/vuln/detail/CVE-2019-17503 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2019-17503 cwe-id: CWE-425 epss-score: 0.00433 epss-percentile: 0.71885 cpe: cpe:2.3:a:kirona:dynamic_resource_scheduling:5.5.3.5:*:*:*:*:*:*:* metadata: max-request: 2 vendor: kirona product: dynamic_resource_scheduling tags: cve,cve2019,exposure,edb,packetstorm,kirona
http: - method: GET path: - "{{BaseURL}}/osm/REGISTER.cmd" - "{{BaseURL}}/osm_tiles/REGISTER.cmd"
matchers-condition: and matchers: - type: word part: body words: - "DEBUGMAPSCRIPT=TRUE" - "@echo off" condition: and
- type: status status: - 200# digest: 4a0a004730450221009794a6fd4393aacd5631ea272891950c66f143784d27140f740b96adf7879bf602205cba01af99e3bec35f7b53095f37f630541fbc8b5291b83327cb7cbcd1cf421d:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2019/CVE-2019-17503.yaml"