Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-5202

EPSS 0.07% · P22
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-5202

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
apt-cacher-ng through 3.3 allows local users to obtain sensitive information by hijacking the hardcoded TCP port. The /usr/lib/apt-cacher-ng/acngtool program attempts to connect to apt-cacher-ng via TCP on localhost port 3142, even if the explicit SocketPath=/var/run/apt-cacher-ng/socket command-line option is passed. The cron job /etc/cron.daily/apt-cacher-ng (which is active by default) attempts this periodically. Because 3142 is an unprivileged port, any local user can try to bind to this port and will receive requests from acngtool. There can be sensitive data in these requests, e.g., if AdminAuth is enabled in /etc/apt-cacher-ng/security.conf. This sensitive data can leak to unprivileged local users that manage to bind to this port before the apt-cacher-ng daemon can.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
apt-cacher-ng 信息泄露漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
apt-cacher-ng 3.3及之前版本中存在信息泄露漏洞。该漏洞源于网络系统或产品在运行过程中存在配置等错误。未授权的攻击者可利用漏洞获取受影响组件敏感信息。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-5202

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-5202

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-01-21 · 37 CVEs total

CVE-2020-7040storeBackup 后置链接漏洞
CVE-2020-1840Huawei Mate 20 安全漏洞
CVE-2014-2680Xmind 安全漏洞
CVE-2016-11018WordPress Huge-IT gallery-images SQL注入漏洞
CVE-2019-19592Jama Software Jama Connect 跨站脚本漏洞
CVE-2020-6849WordPress marketo-forms-and-tracking 跨站请求伪造漏洞
CVE-2019-17357Cacti SQL注入漏洞
CVE-2019-17584Meinberg Funkuhren Meinberg SyncBox/PTP/PTPv2 安全漏洞
CVE-2020-6638Grin 输入验证错误漏洞
CVE-2019-19411Huawei USG9500 信息泄露漏洞
CVE-2020-7594MultiTech Conduit MTCDT-LVW2-24XX 安全漏洞
CVE-2019-19886Trustwave ModSecurity 安全漏洞
CVE-2020-1788多款Huawei产品授权问题漏洞
CVE-2019-20388libxml2 安全漏洞
CVE-2019-20387libsolv 缓冲区错误漏洞
CVE-2020-7595libxml2 安全漏洞
CVE-2019-19413多款Huawei产品LDAP客户端安全漏洞
CVE-2019-19414多款Huawei产品LDAP客户端安全漏洞
CVE-2019-14767DIMO YellowBox CRM 路径遍历漏洞
CVE-2019-20385Logaritmo Aware CallManager 安全漏洞

Showing top 20 of 37 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-5202

No comments yet


Leave a comment