9.8
CVSSv3

CVE-2020-35847

Published: 30/12/2020 Updated: 05/04/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Agentejo Cockpit prior to 0.11.2 allows NoSQL injection via the Controller/Auth.php resetpassword function.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

agentejo cockpit

Exploits

This Metasploit module exploits two NoSQL injection vulnerabilities to retrieve the user list and password reset tokens from the system Next, the USER is targeted to reset their password Then, a command injection vulnerability is used to execute the payload While it is possible to upload a payload and execute it, the command injection provides a ...
Cockpit CMS version 0111 username enumeration and password reset NoSQL injection exploit ...

Github Repositories

CMSpit Challenge on TryHackMe

CMSpit export IP=101024011 Konstantinos Pap - Fri 06 Aug 2021 07:47:38 AM CDT My script initialized all kinds of enumerations (gobuster, nikto and nmap) Nmap detected 2 open ports port 22 and 80 Opening firefox on the server we get a login page No matter what we type in we always end up on the login page This means we need to authenticate or bypass the authentication s

CVE-2020-35847, CVE-2020-35848 : Account Takeover

Cockpit CMS NoSQL Injection (CVE-2020-35847, CVE-2020-35848) Cockpit CMS before version 0112 is vulnerable to a NoSQL Injection vulnerability in the /auth/resetpassword and /auth/newpassword that allows extraction of password reset tokens which allow for user details enumeration as well as password reset Read More - swarmptsecuritycom/rce-cockpit-cms/ This python