Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2023-0678 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: phpIPAM < 1.5.1 has an **Authorization Bypass** flaw. πŸ“‰ **Consequences**: Attackers can download sensitive subnet data (descriptions, IP ranges, usage rates) without logging in.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-862** (Missing Authorization). The `find_full_subnets.php` endpoint fails to verify if the user is authorized.…

Q3Who is affected? (Versions/Components)

🎯 **Affected**: **phpIPAM** versions **prior to 1.5.1**. πŸ“¦ **Component**: The `find_full_subnets.php` script within the phpIPAM application. If you are running an older version, you are at risk!

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Actions**: Unauthenticated users can access **high-usage IP subnet lists**. πŸ“‚ **Data Exposed**: Subnet descriptions, specific IP ranges, and usage rates.…

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Exploitation Threshold**: **LOW**. No authentication required! πŸšͺ No config tweaks needed. Just a simple HTTP request to the vulnerable endpoint is enough to trigger the data leak. Super easy for attackers.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Public Exploit**: **YES**. A PoC is available via **Nuclei templates** (projectdiscovery). 🌐 Wild exploitation is possible since the logic flaw is straightforward and documented. Don't wait!

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for the endpoint `find_full_subnets.php`. πŸ§ͺ Use Nuclei with the CVE-2023-0678 template. If you get a response with subnet data without being logged in, you are vulnerable! 🚨

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Official Fix**: **YES**. Fixed in **phpIPAM 1.5.1**. πŸ› οΈ The vendor patched the authorization check in the commit `1960bd24e8a55796da066237cf11272c44bb1cc4`. Upgrade immediately!

Q9What if no patch? (Workaround)

🚧 **No Patch?**: Block access to `find_full_subnets.php` via WAF or firewall rules. πŸ›‘ Restrict access to the phpIPAM interface to trusted IPs only. Deny unauthenticated requests to this specific PHP file.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. Critical data leak with **zero-auth** exploitation. πŸƒβ€β™‚οΈ Patch to v1.5.1+ ASAP. Your internal IP schema is valuable intel for attackers. Don't leave the door open!