CVE-2020-20012

9.8 CRITICAL

📋 TL;DR

WebPlus Pro v1.4.7.8.4-01 has an incorrect access control vulnerability (CWE-22) that allows attackers to bypass authentication or authorization mechanisms. This affects all systems running this specific version of WebPlus Pro. The CVSS 9.8 score indicates critical severity with network-based exploitation possible without authentication.

💻 Affected Systems

Products:
  • WebPlus Pro
Versions: v1.4.7.8.4-01
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Specific to this exact version; other versions may also be vulnerable but not confirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing unauthorized access to sensitive data, administrative functions, or potential remote code execution.

🟠

Likely Case

Unauthorized access to protected resources, data exfiltration, or privilege escalation within the application.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication, and monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

References suggest exploitation details are publicly available; CWE-22 typically involves path traversal or similar access control bypasses.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Check vendor for updated version. 2. If unavailable, upgrade to latest supported version. 3. Apply security patches if provided.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to WebPlus Pro to trusted IPs only

iptables -A INPUT -p tcp --dport [PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [PORT] -j DROP

Web Application Firewall

all

Deploy WAF with rules to block path traversal and access control bypass attempts

🧯 If You Can't Patch

  • Isolate the system in a segmented network with strict access controls
  • Implement additional authentication layers and monitor all access attempts

🔍 How to Verify

Check if Vulnerable:

Check WebPlus Pro version in admin interface or configuration files; verify if running v1.4.7.8.4-01

Check Version:

Check application configuration or admin panel for version information

Verify Fix Applied:

Test authentication and authorization controls; attempt to access restricted resources without proper credentials

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts
  • Failed authentication followed by successful resource access
  • Unusual file or directory access patterns

Network Indicators:

  • HTTP requests attempting path traversal patterns
  • Access to protected URLs without authentication headers

SIEM Query:

source="webplus_logs" AND (event="unauthorized_access" OR url="*../*")

🔗 References

📤 Share & Export