Skip to content

Instantly share code, notes, and snippets.

CVE-2020-25134
------------------------------------------
Authenticated Local File Inclusion in settings/format
------------------------------------------
[Description]
Penetration test has shown that the application is vulnerable to local file inclusion due to the fact that there is an unrestricted possibility of loading any file with inc.php extension. Inclusion of other files (even though limited to the mentioned extension) can lead to Remote Code Execution in the further analysis and opens further attack vectors.
------------------------------------------
CVE-2020-25133
------------------------------------------
Authenticated Local File Inclusion in ports
------------------------------------------
[Description]
Penetration test has shown that the application is vulnerable to local file inclusion due to the fact that there is an unrestricted possibility of loading any file with inc.php extension. Inclusion of other files (even though limited to the mentioned extension) can lead to Remote Code Execution in the further analysis and opens further attack vectors.
------------------------------------------
CVE-2020-25131
------------------------------------------
Cross Site Scripting in roles
------------------------------------------
[Description]
Penetration test has shown that the application is vulnerable to Cross-Site Scripting (XSS) due to the fact that it is possible to inject and store malicious JavaScript code within it.
------------------------------------------
[Additional Information]
CVE-2020-25130
------------------------------------------
Authenticated Time Based SQL Injection
------------------------------------------
[Description]
Penetration test has shown that the application is vulnerable to SQL Injection due to the fact that it is possible to inject malicious SQL statements in malformed parameter types. Sending improper variable type “Array” allows to bypass core SQL Injection sanitization. Authenticated users are able to inject malicious SQL queries. This vulnerability leads to full database leak and even ckeys that can be used in the authentication process without knowing of username and clear text passwords.
------------------------------------------
CVE- IN Progress
------------------------------------------
Local file read from web root via crafted URI in commandbox <= 5.1.1 allows remote attackers to fetch sensitive files from WEB-INF/ containing for example database connection strings, smtp credentials. Fetched encrypted connection strings can be easily decrypted due to hardcoded secret KEY for all instances of commandbox.
------------------------------------------
[Additional Information]
Example payload:
http://192.168.1.22:50100/lucee//WEB-INF/lucee-server/context/lucee-server.xml
CVE-2020-25132
------------------------------------------
SQL Injection leads to full authentication bypass
------------------------------------------
[Description]
Penetration test has shown that the application is vulnerable to SQL Injection due to the fact that it is possible to inject malicious SQL statements in malformed parameter types. Sending improper variable type “Array” allows to bypass core SQL Injection sanitization. Users are able to inject malicious statements in multiple functions. This vulnerability leads to full authentication bypass, any unauthorized user with access to application is able to exploit this vulnerability
------------------------------------------
CVE-2020-11976 - Apache wicket LFI / markup source file read vulnerability
------------------------------------------
By crafting a special URL it is possible to make Wicket deliver unprocessed HTML templates.
This would allow an attacker to see possibly sensitive information inside a HTML template that is usually removed during rendering.
Affected are Apache Wicket versions 7.16.0, 8.8.0 and 9.0.0-M5
For example if there are credentials in the markup which are never supposed to be visible to the client:
<wicket:remove>