| |
Vulnerability CVE-2020-35580
Published: 2021-05-20
Description: |
A local file inclusion vulnerability in the FileServlet in all SearchBlox before 9.2.2 allows remote, unauthenticated users to read arbitrary files from the operating system via a /searchblox/servlet/FileServlet?col=url= request. Additionally, this may be used to read the contents of the SearchBlox configuration file (e.g., searchblox/WEB-INF/config.xml), which contains both the Super Admin's API key and the base64 encoded SHA1 password hashes of other SearchBlox users. |
Type:
CWE-522 (Insufficiently Protected Credentials)
CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
5/10 |
2.9/10 |
10/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Low |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
Partial |
None |
None |
References: |
https://developer.searchblox.com/docs/getting-started-with-searchblox
https://hateshape.github.io/general/2021/05/11/CVE-2020-35580.html
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|