Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-15392 PoC — Venki Supravizio BPM 信息泄露漏洞

Source
Associated Vulnerability
Title:Venki Supravizio BPM 信息泄露漏洞 (CVE-2020-15392)
Description:Venki Supravizio BPM是巴西Venki公司的一套流程管理解决方案。 Venki Supravizio BPM 10.1.2版本中存在安全漏洞。攻击者可利用该漏洞确定用户名是否有效,进而使用有效的用户名进行暴力攻击。
Description
User Enumeration on Supravizio BPM 10.1.2
Readme
<h2 align="center">
  CVE-2020-15392 
  <br/>
  User Enumeration on Supravizio BPM 10.1.2
</h2>

<p align="center">
  <img src="https://user-images.githubusercontent.com/49153346/88341987-f021ac00-cd14-11ea-836b-0fba611d7540.png" width="350" />
</p>

<hr>

### Description

A user enumeration vulnerability flaw was found in Supravizio BPM, version 10.1.2. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users.


### Exploitation

To exploit this vulnerability, it is necessary to request a password recovery, when adding a invalid contact email the message: "email not found" is displayed and when an valid email: "contact the system administrator".


### PoC

* Invalid User

<img src="https://user-images.githubusercontent.com/49153346/86146371-8116b600-bace-11ea-877b-e8dbeead56ae.JPG"/>

<br />

* Valid User

<img src="https://user-images.githubusercontent.com/49153346/86146379-8411a680-bace-11ea-96d5-3ae081913fe7.JPG"/>

<br />

* Brute Force - Invalid User

<img src="https://user-images.githubusercontent.com/49153346/86146392-87a52d80-bace-11ea-9b9e-109738b907f3.jpg"/>

<br />

* Brute Force - Valid User

<img src="https://user-images.githubusercontent.com/49153346/86146400-8aa01e00-bace-11ea-9efd-e9ceb232ad1c.jpg"/>
File Snapshot

[4.0K] /data/pocs/ffd46827c0281510f6ba334c288e6229d2885856 └── [1.3K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.