.. / CVE-2019-20933

Exploit for InfluxDB <1.7.6 - Authentication Bypass (CVE-2019-20933)

Description:

InfluxDB before 1.7.6 contains an authentication bypass vulnerability via the authenticate function in services/httpd/handler.go. A JWT token may have an empty SharedSecret (aka shared secret). An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.

Proof of Concept

PoC exploit

Nuclei Template

View the template here CVE-2019-20933.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2019/CVE-2019-20933.yaml
Copy

Try the exploit in a lab environment:

Lab Machine Link
Hack The Box Devzat Go to Practice

References:

https://nvd.nist.gov/vuln/detail/CVE-2019-20933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20933
https://github.com/influxdata/influxdb/commit/761b557315ff9c1642cf3b0e5797cd3d983a24c0
https://github.com/LorenzoTullini/InfluxDB-Exploit-CVE-2019-20933
https://github.com/influxdata/influxdb/compare/v1.7.5...v1.7.6