### Multiple vulnerabilities in technology #Intellian (CVE-2019-17269, CVE-2020-7980,CVE-2020-7999, CVE-2020-8000, CVE-2020-8001)
**"Intellian Aptus Web"**  
**Vulnerabilities identified**
1) Credencials harcoded ( CVE-2020-8000)
  
Path, Resource: _**http:// <host>/include_js/bim_web_svc_auth.js?**_
  
[](https://images.seebug.org/1583460119850-w331s)
  
  
2) _**RCE ( CVE-2020-7980)**_
Reference: https://sku11army.blogspot.com/2020/01/intellian-aptus-web-rce-
intellian.html
  
Path explotable: http://<host>/cgi-bin/libagent.cgi?type=J
Variable vuln: Q
  
poc: Request to service web  
[](https://images.seebug.org/1583460122712-w331s)
  
  
  
[](https://images.seebug.org/1583460127494-w331s)
  
  
  
**Tested in :**
  
_**"Intellian, Aptus Web V100 v1.24"  
"Intellian, Aptus Web V80 v1.24"**_  
_**  
**__**  
**_**"Intellian APTUS Mobile App"**  
PoC with app version: 1.0.2
  
Static analysis. (Only decompiling the "* .apk")
  
  
Descompile code with tools: "jadx-gui" and modSF
  
[](https://images.seebug.org/1583460131689-w331s)
  
  
**Vulnerabilities identified**
  
**1) Credentials harcoded ( CVE-2020-8001 )**
  
  
[](https://images.seebug.org/1583460135606-w331s)
Testing/check the credentials:  
- user: masteruser
- pass: intellian
  
[](https://images.seebug.org/1583460138413-w331s)
  
  
  
2) API Key harcoded ( CVE-2020-7999 )
  
> _**package** com.uniwebs.network.define; **classe** : UpdateProtocol()_
  
  
[](https://images.seebug.org/1583460140965-w331s)
**  
**
**  
**
**  
**
**  
**
**  
**
public static String DOWNLOAD_API_KEY = "F4O5c7wGpOk8lmevm6LoWAXeIx6In+Qi";
public static String FILE_DOWNLOAD_API_KEY = "SdAXizuDB4STYpcxRwWwsA==";
  
**  
**
**  
**
**  
**
**"Intellian Remote Access" **
**  
**
  
El aplicativo web utilizado para la gestion y administracion de las terminales
satelitales de la firma _**Intellian **_ cuenta con una vulnerabilidad critica
(y facil de explotar). Es decir, el aplicativo permite realizar Ejecucion de
comandos remotos (RCE)
**  
**
**  
**
**  
RCE: (** **CVE-2019-17269)**
**  
**
**In The wild !**
shodan dorks: _title:"Intellian Remote Access"_  
_  
_  
  
[](https://images.seebug.org/1583460151667-w331s)  
  
## **_Access to device:_**
  
FTP  
[](https://images.seebug.org/1583460153805-w331s)
  
  
SSH  
  
[](https://images.seebug.org/1583460157887-w331s)
  
[](https://images.seebug.org/1583460160420-w331s)
  
  
WEB:  
[](https://images.seebug.org/1583460162234-w331s)
  
------
  
[](https://images.seebug.org/1583460164256-w331s)
  
  
RCE; Step by steap  
1)  
[](https://images.seebug.org/1583460166577-w331s)
  
  
a) problem !  
[](https://images.seebug.org/1583460169623-w331s)
  
b) no problem :)  
[](https://images.seebug.org/1583460173039-w331s)
  
[](https://images.seebug.org/1583460176453-w331s)
  
  
**Easy Tool !**  
[](https://images.seebug.org/1583460180207-w331s)  
[](https://images.seebug.org/1583460186512-w331s)  
[](https://images.seebug.org/1583460189385-w331s)  
[](https://images.seebug.org/1583460203339-w331s)  
  
Saludos,
[@Capitan_Alfa](https://twitter.com/capitan_Alfa)
                       
                       
        
          
暂无评论