Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-15367 PoC — Venki Supravizio BPM 安全漏洞

Source
Associated Vulnerability
Title:Venki Supravizio BPM 安全漏洞 (CVE-2020-15367)
Description:Venki Supravizio BPM是巴西Venki公司的一套流程管理解决方案。 Venki Supravizio BPM 10.1.2版本中存在安全漏洞,该漏洞源于程序未限制身份验证尝试的次数。攻击者可利用该漏洞对登录页面进行暴力验证攻击。
Description
Brute Force on Supravizio BPM 10.1.2
Readme
<h2 align="center">
  CVE-2020-15367 
  <br/>
  Brute Force on Supravizio BPM 10.1.2
</h2>

<p align="center">
  <img src="https://user-images.githubusercontent.com/49153346/88341987-f021ac00-cd14-11ea-836b-0fba611d7540.png" width="350" />
</p>

<hr>

### Description

Venki Supravizio BPM 10.1.2 does not limit the number of authentication attempts. An unauthenticated user may exploit this vulnerability to launch a brute-force authentication attack against the Login page.


### Exploitation

To exploit this vulnerability, it is necessary using the user enumeration vulnerability in Password Recovery (CVE-2020-15392) to enumerate the valid users and after could perform an arbitrary number of authentication attempts using different passwords, and eventually gain access to the targeted account.


### PoC

* Login Page

<img src="https://user-images.githubusercontent.com/49153346/86490915-74e55f80-bd3f-11ea-8806-7babbd5f1491.JPG"/>

<br />

* Brute Force Login - Invalid User 

<img src="https://user-images.githubusercontent.com/49153346/86490924-7878e680-bd3f-11ea-8a0e-4792f8ed33f6.jpg"/>

<br />

* Brute Force Login - Valid User 

<img src="https://user-images.githubusercontent.com/49153346/86490926-7adb4080-bd3f-11ea-9331-e389fa44783f.jpg"/>
File Snapshot

[4.0K] /data/pocs/5c0dc58f4203e825215f6cf980afb3468a7e0896 └── [1.2K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.