app/Model/feed.php in MISP before 2.4.124 allows administrators to choose arbitrary files that should be ingested by MISP. This does not cause a leak of the full contents of a file, but does cause a leaks of strings that match certain patterns. Among the data that can leak are passwords from database.php or GPG key passphrases from config.php.
References
Link | Resource |
---|---|
https://github.com/MISP/MISP/commit/30ff4b6451549dae7b526d4fb3a49061311ed477 | Patch Third Party Advisory |
https://matthias.sdfeu.org/misp-poc.py | Exploit Third Party Advisory |
https://github.com/MISP/MISP/commit/30ff4b6451549dae7b526d4fb3a49061311ed477 | Patch Third Party Advisory |
https://matthias.sdfeu.org/misp-poc.py | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/MISP/MISP/commit/30ff4b6451549dae7b526d4fb3a49061311ed477 - Patch, Third Party Advisory | |
References | () https://matthias.sdfeu.org/misp-poc.py - Exploit, Third Party Advisory |
Information
Published : 2020-04-02 12:15
Updated : 2024-11-21 04:57
NVD link : CVE-2020-11458
Mitre link : CVE-2020-11458
CVE.ORG link : CVE-2020-11458
JSON object : View
Products Affected
misp
- misp
CWE