Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-25134

EPSS 3.52% · P88
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-25134

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to directory traversal and local file inclusion due to the fact that there is an unrestricted possibility of loading any file with an inc.php extension. Inclusion of other files (even though limited to the mentioned extension) can lead to Remote Code Execution. This can occur via /settings/?format=../ URIs to pages/settings.inc.php.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Observium Professional Enterprise Community 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Observium是英国observium的一个免费的服务器监控平台。该平台由PHP编写的基于自动发现 SNMP 的网络监控平台,支持非常广泛的网络硬件和操作系统,包括 Cisco、Windows、Linux、HP、NetApp 等等。 Observium Professional, Enterprise & Community 20.8.10631版本中存在安全漏洞,该漏洞源于存在无限限制地加载具有inc.php扩展名的文件的事实,该漏洞允许攻击者遍历目录和进行本地文件攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-25134

#POC DescriptionSource LinkShenlong Link
1CVE-2020-25134 Authenticated Local File Inclusion in settings/formathttps://github.com/ynsmroztas/CVE-2020-25134POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-25134

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-09-25 · 84 CVEs total

CVE-2020-77356.6 MEDIUMCommand Injection
CVE-2020-15369Brocade Fabric OS 安全漏洞
CVE-2018-6448Brocade Fabric OS 安全漏洞
CVE-2019-16211Broadcom Brocade SANnav 安全漏洞
CVE-2020-25131Observium Professional Enterprise Community 跨站脚本漏洞
CVE-2019-16212Broadcom Brocade SANnav 安全漏洞
CVE-2020-15394ZOHO ManageEngine Applications Manager SQL注入漏洞
CVE-2020-15521ZOHO ManageEngine Applications Manager 跨站脚本漏洞
CVE-2019-11556Pagure 跨站脚本漏洞
CVE-2020-26098cPanel 安全漏洞
CVE-2020-13995U.S. Air Force Sensor Data Management System extract75 缓冲区错误漏洞
CVE-2018-6449Brocade Fabric OS 跨站脚本漏洞
CVE-2020-15370Brocade Fabric OS 日志信息泄露漏洞
CVE-2020-15371Brocade Fabric OS 代码注入漏洞
CVE-2020-15372Brocade Fabric OS 安全漏洞
CVE-2020-15373Brocade Fabric OS 缓冲区错误漏洞
CVE-2020-15374Brocade Fabric OS 输入验证错误漏洞
CVE-2020-5930F5 BIG-IP 安全漏洞
CVE-2020-5929F5 BIG-IP 安全漏洞
CVE-2020-25130Observium Professional Enterprise Community SQL注入漏洞

Showing top 20 of 84 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-25134

No comments yet


Leave a comment