Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-35847 — AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **What is this vulnerability?** * **Essence:** A critical **NoSQL Injection** flaw in Agentejo Cockpit CMS. * **Location:** Found in the `Auth.php` controller, specifically the `resetpassword` function. * **Cons…

Q2Root Cause? (CWE/Flaw)

🛡️ **Root Cause? (CWE/Flaw)** * **Flaw:** Improper validation of user-supplied input in NoSQL queries. * **CWE:** While not explicitly listed in the JSON, this is a classic **NoSQL Injection** vulnerability (similar…

Q3Who is affected? (Versions/Components)

👥 **Who is affected? (Versions/Components)** * **Product:** Agentejo Cockpit CMS. * **Affected Versions:** **Before version 0.11.2**. * **Specific Component:** `Controller/Auth.php` -> `resetpassword` and `newpass…

Q4What can hackers do? (Privileges/Data)

🕵️ **What can hackers do? (Privileges/Data)** * **Account Takeover:** Reset passwords for any user by stealing reset tokens.…

Q5Is exploitation threshold high? (Auth/Config)

🔓 **Is exploitation threshold high? (Auth/Config)** * **Threshold:** **LOW**. * **Authentication:** No authentication required to exploit the `resetpassword` endpoint. * **Complexity:** Simple HTTP requests can tr…

Q6Is there a public Exp? (PoC/Wild Exploitation)

💣 **Is there a public Exp? (PoC/Wild Exploitation)** * **Yes!…

Q7How to self-check? (Features/Scanning)

🔍 **How to self-check? (Features/Scanning)** * **Manual Check:** Try accessing `/auth/resetpassword` with crafted NoSQL injection payloads. * **Automated Scan:** Use tools like **Nuclei** with the specific CVE-2020-…

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Is it fixed officially? (Patch/Mitigation)** * **Yes!…

Q9What if no patch? (Workaround)

🛑 **What if no patch? (Workaround)** * **WAF:** Deploy a Web Application Firewall to block NoSQL injection patterns in `/auth/resetpassword` requests. * **Input Validation:** Manually patch the `Auth.php` file to sa…

Q10Is it urgent? (Priority Suggestion)

⏳ **Is it urgent? (Priority Suggestion)** * **Priority:** **HIGH**. * **Reason:** NoSQL Injection leads directly to **Account Takeover**. Public exploits are available.…