### Multiple vulnerabilities in technology #Intellian (CVE-2019-17269, CVE-2020-7980,CVE-2020-7999, CVE-2020-8000, CVE-2020-8001)
**"Intellian Aptus Web"**
**Vulnerabilities identified**
1) Credencials harcoded ( CVE-2020-8000)
Path, Resource: _**http:// <host>/include_js/bim_web_svc_auth.js?**_
[](https://images.seebug.org/1583460119850-w331s)
2) _**RCE ( CVE-2020-7980)**_
Reference: https://sku11army.blogspot.com/2020/01/intellian-aptus-web-rce-
intellian.html
Path explotable: http://<host>/cgi-bin/libagent.cgi?type=J
Variable vuln: Q
poc: Request to service web
[](https://images.seebug.org/1583460122712-w331s)
[](https://images.seebug.org/1583460127494-w331s)
**Tested in :**
_**"Intellian, Aptus Web V100 v1.24"
"Intellian, Aptus Web V80 v1.24"**_
_**
**__**
**_**"Intellian APTUS Mobile App"**
PoC with app version: 1.0.2
Static analysis. (Only decompiling the "* .apk")
Descompile code with tools: "jadx-gui" and modSF
[](https://images.seebug.org/1583460131689-w331s)
**Vulnerabilities identified**
**1) Credentials harcoded ( CVE-2020-8001 )**
[](https://images.seebug.org/1583460135606-w331s)
Testing/check the credentials:
- user: masteruser
- pass: intellian
[](https://images.seebug.org/1583460138413-w331s)
2) API Key harcoded ( CVE-2020-7999 )
> _**package** com.uniwebs.network.define; **classe** : UpdateProtocol()_
[](https://images.seebug.org/1583460140965-w331s)
**
**
**
**
**
**
**
**
**
**
public static String DOWNLOAD_API_KEY = "F4O5c7wGpOk8lmevm6LoWAXeIx6In+Qi";
public static String FILE_DOWNLOAD_API_KEY = "SdAXizuDB4STYpcxRwWwsA==";
**
**
**
**
**
**
**"Intellian Remote Access" **
**
**
El aplicativo web utilizado para la gestion y administracion de las terminales
satelitales de la firma _**Intellian **_ cuenta con una vulnerabilidad critica
(y facil de explotar). Es decir, el aplicativo permite realizar Ejecucion de
comandos remotos (RCE)
**
**
**
**
**
RCE: (** **CVE-2019-17269)**
**
**
**In The wild !**
shodan dorks: _title:"Intellian Remote Access"_
_
_
[](https://images.seebug.org/1583460151667-w331s)
## **_Access to device:_**
FTP
[](https://images.seebug.org/1583460153805-w331s)
SSH

[](https://images.seebug.org/1583460157887-w331s)
[](https://images.seebug.org/1583460160420-w331s)
WEB:
[](https://images.seebug.org/1583460162234-w331s)
------
[](https://images.seebug.org/1583460164256-w331s)
RCE; Step by steap
1)
[](https://images.seebug.org/1583460166577-w331s)
a) problem !
[](https://images.seebug.org/1583460169623-w331s)
b) no problem :)
[](https://images.seebug.org/1583460173039-w331s)
[](https://images.seebug.org/1583460176453-w331s)
**Easy Tool !**
[](https://images.seebug.org/1583460180207-w331s)
[](https://images.seebug.org/1583460186512-w331s)
[](https://images.seebug.org/1583460189385-w331s)
[](https://images.seebug.org/1583460203339-w331s)
Saludos,
[@Capitan_Alfa](https://twitter.com/capitan_Alfa)
暂无评论