关联漏洞
标题:Mind iMind Server 信息泄露漏洞 (CVE-2020-24765)Description:Mind iMind Server是俄罗斯mind的一个视频会议平台。 Mind iMind Server 3.13.65版本存在安全漏洞,攻击者可利用该漏洞通过 api/rs/monitoring/rs/api/system/dump-diagnostic-info?server=127.0.0.1请求读取自诊断档案。
Description
Authentication Bypass Vulnerability in Mind Server.
介绍
# CVE-2020-24765
Authentication Bypass Vulnerability in <a href="https://imind.ru/">Mind Server</a> version <= 3.13.65 allows any user to steal the self-diagnostic archive via a direct request.
CVSS v2: (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS v2 Score (BS): 5
CVSS v3: (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)
CVSS v3 Score (BS): 5.3
# Information
<b>Description:</b> Authentication Bypass Vulnerability allows any user to steal the self-diagnostic archive via a direct request https://PWND.SITE/api/rs/monitoring/rs/api/system/dump-diagnostic-info?server=127.0.0.1. The archive contains copies of the main configuration files and event logs of Mind Server portal. An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks.
<b>Class:</b> Design Error
<b>Researcher:</b> Vadim Golovanov
<b>Issue date:</b> 2020-07-06 (Initial Advisory)
<b>Public release:</b> 2020-10-08
<b>Disclosure Link:</b>
<b>NIST CVE Link:</b> https://nvd.nist.gov/vuln/detail/CVE-2020-24765
# POC
<b>An example of vector:<b/> the official site of Vendor
https://vcs.imind.ru/api/rs/monitoring/rs/api/system/dump-diagnostic-info?server=127.0.0.1
# Screenshots:


文件快照
[4.0K] /data/pocs/8d29612e1382eae12cdc4ef52e6ee9ec89437754
├── [182K] POC_IMIND_1.png
├── [ 98K] POC_IMIND_2.png
└── [1.3K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。