CVE-2020-35131 Scanner

CVE-2020-35131 Scanner - Remote Code Execution vulnerability in Cockpit CMS

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

22 days 13 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

-

Cockpit CMS is an open-source content management system primarily used by developers and organizations to manage and structure digital content. It provides a flexible structure and ease of use for content management, making it popular among developers for creating dynamic websites and applications. Cockpit CMS can be deployed on various platforms and is commonly used in environments where custom PHP development is necessary. It is often employed for its capabilities to manage content across multiple platforms seamlessly. Developers favor Cockpit for its adaptability and efficiency in managing diverse digital content needs.

The Remote Code Execution vulnerability in Cockpit CMS could allow attackers to execute arbitrary code on the server hosting the CMS. The vulnerability arises from improper handling of PHP code injections via specific endpoints within the software. By exploiting this vulnerability, attackers can potentially take full control over the CMS and underlying server. This vulnerability is particularly concerning because it requires no authentication to exploit, meaning remote attackers could cause significant harm. The nature of RCE vulnerabilities means they are often regarded as high-risk.

The vulnerability details indicate that it resides within Cockpit CMS, particularly in the function registerCriteriaFunction in the lib/MongoLite/Database.php file. This allows an attacker to inject PHP code via JSON data submitted to the /auth/check or /auth/requestreset endpoints. These endpoints are typically used for authentication purposes, yet due to improper sanitization, they can be exploited for code execution. This highlights the need for robust sanitization checks on user input to prevent malicious code execution.

When exploited, this vulnerability can lead to severe outcomes such as unauthorized access, data leaks, disruption of service, and complete system compromise. Attackers can deploy malware, modify existing content, or shutdown services affecting the CMS's availability. The repercussions of a successful exploit may result in reputational damage for affected organizations, data loss, and potentially costly downtime. Immediate patching and applying security best practices can mitigate these risks.

REFERENCES

Get started to protecting your digital assets