Description
The TOTVS Fluig platform allows path traversal through the parameter "file = .. /" encoded in base64. This affects all versions Fluig Lake 1.7.0, Fluig 1.6.5 and Fluig 1.6.4
Affected Software
Related
{"id": "CVE-2020-29134", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2020-29134", "description": "The TOTVS Fluig platform allows path traversal through the parameter \"file = .. /\" encoded in base64. This affects all versions Fluig Lake 1.7.0, Fluig 1.6.5 and Fluig 1.6.4", "published": "2021-03-05T16:15:00", "modified": "2021-05-21T20:15:00", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8}, "severity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 4.0}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-29134", "reporter": "cve@mitre.org", "references": ["https://github.com/lucxssouza/CVE-2020-29134", "https://www.exploit-db.com/exploits/49622", "https://github.com/lucxssouza/CVE-2020-29134/blob/main/README.md", "https://systemweakness.com/cve-2020-29134-totvs-fluig-platform-f298ea84b507"], "cvelist": ["CVE-2020-29134"], "immutableFields": [], "lastseen": "2022-03-23T17:21:01", "viewCount": 17, "enchantments": {"dependencies": {"references": [{"type": "attackerkb", "idList": ["AKB:2DA5F4FA-FE54-402C-9F96-2543D41B8B7F"]}, {"type": "checkpoint_advisories", "idList": ["CPAI-2020-3294"]}, {"type": "exploitdb", "idList": ["EDB-ID:49622"]}, {"type": "githubexploit", "idList": ["A164D41E-15FB-5227-821A-1A598CA210F5"]}], "rev": 4}, "score": {"value": 4.9, "vector": "NONE"}, "twitter": {"counter": 6, "modified": "2021-04-23T01:09:46", "tweets": [{"link": "https://twitter.com/threatintelctr/status/1370413957006168074", "text": " NEW: CVE-2020-29134 TOTVS Fluig Platform allows directory traversal via a base64 encoded in paremeter \"file=../\" to a volume/stream/ URI. This affects: Fluig Lake 1.7.0-210217, Fluig Lake 1.7.0-210209, Fluig La... (click for more) Severity: HIGH https://t.co/xfFFcird84?amp=1"}, {"link": "https://twitter.com/threatintelctr/status/1370413957006168074", "text": " NEW: CVE-2020-29134 TOTVS Fluig Platform allows directory traversal via a base64 encoded in paremeter \"file=../\" to a volume/stream/ URI. This affects: Fluig Lake 1.7.0-210217, Fluig Lake 1.7.0-210209, Fluig La... (click for more) Severity: HIGH https://t.co/xfFFcird84?amp=1"}, {"link": "https://twitter.com/threatintelctr/status/1375621190509821955", "text": " NEW: CVE-2020-29134 The TOTVS Fluig platform allows path traversal through the parameter \"file = .. /\" encoded in base64. This affects all versions Fluig Lake 1.7.0, Fluig 1.6.5 and Fluig 1.6.4 Severity: HIGH https://t.co/xfFFcird84?amp=1"}, {"link": "https://twitter.com/CryptoRoot_/status/1385926351778091016", "text": "CVE-2020-29134 por /lucxs_souza\n\nTipo: LFI (Local File Inclusion).\nVers\u00f5es afetadas: Fluig Lake 1.7.0, Fluig 1.6.5 e Fluig 1.6.4\nhttps://t.co/ETtIDFQuHX?amp=1\n/hashtag/cryptoroot?src=hashtag_click /hashtag/cve?src=hashtag_click /hashtag/totvs?src=hashtag_click"}, {"link": "https://twitter.com/WolfgangSesin/status/1370432134230515716", "text": "New post from https://t.co/uXvPWJy6tj?amp=1 (CVE-2020-29134 (fluig)) has been published on https://t.co/IrYTwSWX2e?amp=1"}, {"link": "https://twitter.com/threatintelctr/status/1370504558502412299", "text": " NEW: CVE-2020-29134 The TOTVS Fluig platform allows path traversal through the parameter \"file = .. /\" encoded in base64. This affects all versions Fluig Lake 1.7.0, Fluig 1.6.5 and Fluig 1.6.4 Severity: HIGH https://t.co/xfFFcird84?amp=1"}]}, "backreferences": {"references": [{"type": "attackerkb", "idList": ["AKB:2DA5F4FA-FE54-402C-9F96-2543D41B8B7F"]}, {"type": "checkpoint_advisories", "idList": ["CPAI-2020-3294"]}, {"type": "githubexploit", "idList": ["A164D41E-15FB-5227-821A-1A598CA210F5"]}]}, "exploitation": null, "vulnersScore": 4.9}, "_state": {"dependencies": 0}, "_internal": {}, "cna_cvss": {"cna": null, "cvss": {}}, "cpe": ["cpe:/a:totvs:fluig:1.7.0", "cpe:/a:totvs:fluig:1.6.4", "cpe:/a:totvs:fluig:1.6.5"], "cpe23": ["cpe:2.3:a:totvs:fluig:1.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:totvs:fluig:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:totvs:fluig:1.6.5:*:*:*:*:*:*:*"], "cwe": ["CWE-22"], "affectedSoftware": [{"cpeName": "totvs:fluig", "version": "1.6.4", "operator": "eq", "name": "totvs fluig"}, {"cpeName": "totvs:fluig", "version": "1.6.5", "operator": "eq", "name": "totvs fluig"}, {"cpeName": "totvs:fluig", "version": "1.7.0", "operator": "eq", "name": "totvs fluig"}], "affectedConfiguration": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:totvs:fluig:1.6.4:*:*:*:*:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:totvs:fluig:1.6.5:*:*:*:*:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:totvs:fluig:1.7.0:*:*:*:*:*:*:*", "cpe_name": []}]}]}, "extraReferences": [{"url": "https://github.com/lucxssouza/CVE-2020-29134", "name": "https://github.com/lucxssouza/CVE-2020-29134", "refsource": "MISC", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://www.exploit-db.com/exploits/49622", "name": "https://www.exploit-db.com/exploits/49622", "refsource": "MISC", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"]}, {"url": "https://github.com/lucxssouza/CVE-2020-29134/blob/main/README.md", "name": "https://github.com/lucxssouza/CVE-2020-29134/blob/main/README.md", "refsource": "MISC", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://systemweakness.com/cve-2020-29134-totvs-fluig-platform-f298ea84b507", "name": "https://systemweakness.com/cve-2020-29134-totvs-fluig-platform-f298ea84b507", "refsource": "MISC", "tags": []}]}
{"checkpoint_advisories": [{"lastseen": "2022-02-16T19:35:02", "description": "A directory traversal vulnerability exists in TOTVS Fluig Platform. Successful exploitation of this vulnerability could allow an attacker to access arbitrary files on the affected system.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 8.6, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 4.0}, "published": "2021-03-20T00:00:00", "type": "checkpoint_advisories", "title": "TOTVS Fluig Platform Directory Traversal (CVE-2020-29134)", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-29134"], "modified": "2021-03-20T00:00:00", "id": "CPAI-2020-3294", "href": "", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}}], "attackerkb": [{"lastseen": "2021-07-20T20:10:23", "description": "The TOTVS Fluig platform allows path traversal through the parameter \u201cfile = .. /\u201d encoded in base64. This affects all versions Fluig Lake 1.7.0, Fluig 1.6.5 and Fluig 1.6.4\n\n \n**Recent assessments:** \n \n**lucxssouza** at March 24, 2021 6:54pm UTC reported:\n\nAssessed Attacker Value: 5 \nAssessed Attacker Value: 5Assessed Attacker Value: 5\n", "edition": 2, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 8.6, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 4.0}, "published": "2021-03-05T00:00:00", "type": "attackerkb", "title": "CVE-2020-29134", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-29134"], "modified": "2021-03-13T00:00:00", "id": "AKB:2DA5F4FA-FE54-402C-9F96-2543D41B8B7F", "href": "https://attackerkb.com/topics/X8J1Y1tK7q/cve-2020-29134", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}}], "githubexploit": [{"lastseen": "2022-02-22T10:13:54", "description": "# Totvs Fluig Platform\n \n Fluig is the productivity and ...", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 8.6, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 4.0}, "published": "2021-02-11T13:44:40", "type": "githubexploit", "title": "Exploit for Path Traversal in Totvs Fluig", "bulletinFamily": "exploit", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-29134"], "modified": "2022-02-22T01:57:13", "id": "A164D41E-15FB-5227-821A-1A598CA210F5", "href": "", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}, "privateArea": 1}]}