TCExam <= 14.8.1 - Sensitive Information Exposure
ID: CVE-2021-20114
Severity: high
Author: push4d
Tags: cve,cve2021,tcexam,disclosure,exposure,tenable,tecnick
Description
Section titled “Description”When installed following the default/recommended settings, TCExam <= 14.8.1 allowed unauthenticated users to access the /cache/backup/ directory, which includes sensitive database backup files.
YAML Source
Section titled “YAML Source”id: CVE-2021-20114
info: name: TCExam <= 14.8.1 - Sensitive Information Exposure author: push4d severity: high description: When installed following the default/recommended settings, TCExam <= 14.8.1 allowed unauthenticated users to access the /cache/backup/ directory, which includes sensitive database backup files. impact: | An attacker can gain access to sensitive information, potentially leading to unauthorized access or data leakage. remediation: | Upgrade TCExam to a version higher than 14.8.1 to mitigate the vulnerability. reference: - https://es-la.tenable.com/security/research/tra-2021-32?tns_redirect=true - https://nvd.nist.gov/vuln/detail/CVE-2021-20114 - https://www.tenable.com/security/research/tra-2021-32 - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2021-20114 cwe-id: CWE-425 epss-score: 0.01028 epss-percentile: 0.83792 cpe: cpe:2.3:a:tecnick:tcexam:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: tecnick product: tcexam tags: cve,cve2021,tcexam,disclosure,exposure,tenable,tecnick
http: - method: GET path: - "{{BaseURL}}/cache/backup/"
matchers-condition: and matchers: - type: word words: - "Index of /cache/backup" - "Parent Directory" - ".sql.gz" condition: and
- type: status status: - 200# digest: 4a0a00473045022064572c40fe699c43b5b07bcac8686b0a3e8664e00a7fd9e74e67b93f3ef91ffa0221009991e22709d5ac7667bec94a68b25fb869e746ed539ebebdd2d1a68a2bb6a148:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-20114.yaml"