CVE-2020-13474
Vulnerability Scoring
Attack Complexity Details
- Attack Complexity: Low Impact
- Attack Vector: NETWORK
- Privileges Required: Low Impact
- Scope: UNCHANGED
- User Interaction: NONE
CIA Impact Definition
- Confidentiality:
- Integrity: HIGH IMPACT
- Availability:
CVE-2020-13474 Vulnerability Summary
In NCH Express Accounts 8.24 and earlier, an authenticated low-privilege user can enter a crafted URL to access higher-privileged functionalities such as Add/Edit users.
Access Complexity Graph for CVE-2020-13474
Impact Analysis for CVE-2020-13474
CVE-2020-13474: Detailed Information and External References
EPSS
0.00116
EPSS %
0.46613
References
0.00116
- https://cvewalkthrough.com/cve-2020-13474-nch-express-accounts-privilege-escalation/
- https://tejaspingulkar.blogspot.com/2020/12/cve-2020-13474-nch-express-accounts.html
CWE
CWE-425
CAPEC
0.00116
- Directory Indexing: An adversary crafts a request to a target that results in the target listing/indexing the content of a directory as output. One common method of triggering directory contents as output is to construct a request containing a path that terminates in a directory name rather than a file name since many applications are configured to provide a list of the directory's contents when such a request is received. An adversary can use this to explore the directory tree on a target as well as learn the names of files. This can often end up revealing test files, backup files, temporary files, hidden files, configuration files, user accounts, script contents, as well as naming conventions, all of which can be used by an attacker to mount additional attacks.
- Detect Unpublicized Web Pages: An adversary searches a targeted web site for web pages that have not been publicized. In doing this, the adversary may be able to gain access to information that the targeted site did not intend to make public.
- Detect Unpublicized Web Services: An adversary searches a targeted web site for web services that have not been publicized. This attack can be especially dangerous since unpublished but available services may not have adequate security controls placed upon them given that an administrator may believe they are unreachable.
- Key Negotiation of Bluetooth Attack (KNOB): An adversary can exploit a flaw in Bluetooth key negotiation allowing them to decrypt information sent between two devices communicating via Bluetooth. The adversary uses an Adversary in the Middle setup to modify packets sent between the two devices during the authentication process, specifically the entropy bits. Knowledge of the number of entropy bits will allow the attacker to easily decrypt information passing over the line of communication.
- Forceful Browsing: An attacker employs forceful browsing (direct URL entry) to access portions of a website that are otherwise unreachable. Usually, a front controller or similar design pattern is employed to protect access to portions of a web application. Forceful browsing enables an attacker to access information, perform privileged operations and otherwise reach sections of the web application that have been improperly protected.
Vulnerable Configurations
-
cpe:2.3:a:nchsoftware:express_accounts:-:*:*:*:*:*:*:*
cpe:2.3:a:nchsoftware:express_accounts:-:*:*:*:*:*:*:*
-
cpe:2.3:a:nchsoftware:express_accounts:8.24:*:*:*:*:*:*:*
cpe:2.3:a:nchsoftware:express_accounts:8.24:*:*:*:*:*:*:*
CVSS3 Source
nvd@nist.gov
CVSS3 Type
Primary
CVSS3 Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Protect Your Infrastructure: Combat Critical CVE Threats
Stay updated with real-time CVE vulnerabilities and take action to secure your systems. Enhance your cybersecurity posture with the latest threat intelligence and mitigation techniques. Develop the skills necessary to defend against CVEs and secure critical infrastructures. Join the top cybersecurity professionals safeguarding today's infrastructures.