CVE-2020-18646

7.5 HIGH

📋 TL;DR

CVE-2020-18646 is an information disclosure vulnerability in NoneCMS v1.3 that allows remote attackers to access sensitive information through the /public/index.php component. This affects all users running the vulnerable version of NoneCMS, potentially exposing configuration details, database credentials, or other sensitive data.

💻 Affected Systems

Products:
  • NoneCMS
Versions: v1.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects NoneCMS v1.3; other versions may have different security configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain database credentials, configuration files, or sensitive user data leading to complete system compromise or data breach.

🟠

Likely Case

Attackers access configuration files revealing system paths, database settings, or other sensitive information that could facilitate further attacks.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to information disclosure without direct system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request to vulnerable endpoint can trigger information disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.3.1 or later

Vendor Advisory: https://github.com/nangge/noneCms

Restart Required: No

Instructions:

1. Backup current installation. 2. Download latest version from official repository. 3. Replace vulnerable files with patched version. 4. Verify functionality.

🔧 Temporary Workarounds

Restrict access to /public/index.php

all

Configure web server to block or restrict access to the vulnerable endpoint

# Apache: Add to .htaccess
<Files "index.php">
    Order Deny,Allow
    Deny from all
</Files>
# Nginx: Add to server block
location ~ ^/public/index\.php$ {
    deny all;
    return 403;
}

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can access the NoneCMS instance
  • Deploy a web application firewall (WAF) with rules to block requests to /public/index.php

🔍 How to Verify

Check if Vulnerable:

Attempt to access http://[target]/public/index.php and check if sensitive information is returned

Check Version:

Check NoneCMS version in admin panel or read version file if available

Verify Fix Applied:

Verify the same request now returns appropriate error or no sensitive data

📡 Detection & Monitoring

Log Indicators:

  • Multiple requests to /public/index.php from single IP
  • Unusual file access patterns in web server logs

Network Indicators:

  • HTTP GET requests to /public/index.php with unusual parameters
  • Traffic spikes to specific endpoint

SIEM Query:

source="web_server" AND uri="/public/index.php" AND status=200

🔗 References

📤 Share & Export