CVE-2020-28872
📋 TL;DR
This vulnerability allows unauthorized attackers to create valid administrative credentials in Monitorr v1.7.6m, bypassing authentication entirely. This affects all deployments of Monitorr 1.7.6m that have the vulnerable file accessible. Once credentials are created, attackers gain full administrative access to the monitoring system.
💻 Affected Systems
- Monitorr
📦 What is this software?
Monitorr by Monitorr
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise leading to remote code execution, data theft, and persistent backdoor installation on the server hosting Monitorr.
Likely Case
Unauthorized administrative access to Monitorr dashboard, allowing attackers to view sensitive monitoring data and potentially upload malicious files.
If Mitigated
Limited impact if proper network segmentation and access controls prevent external access to the vulnerable endpoint.
🎯 Exploit Status
Multiple public exploit scripts are available that automate credential creation and subsequent RCE through file upload functionality.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.7.7d or later
Vendor Advisory: https://github.com/Monitorr/Monitorr
Restart Required: No
Instructions:
1. Backup current Monitorr installation. 2. Download latest version from official GitHub repository. 3. Replace all files with new version. 4. Verify _register.php file has proper authentication checks.
🔧 Temporary Workarounds
Remove vulnerable file
linuxDelete or restrict access to the vulnerable _register.php file
rm /path/to/Monitorr/assets/config/_installation/_register.php
Web server access restriction
allBlock access to the vulnerable endpoint using web server configuration
# Apache: <Location "/assets/config/_installation/_register.php">
Require all denied
</Location>
# Nginx: location ~* /assets/config/_installation/_register.php { deny all; }
🧯 If You Can't Patch
- Implement strict network access controls to limit Monitorr access to trusted IP addresses only
- Deploy web application firewall (WAF) rules to block requests to the vulnerable _register.php endpoint
🔍 How to Verify
Check if Vulnerable:
Check if file exists: /Monitorr/assets/config/_installation/_register.php and examine if it contains proper authentication checks before user registration.
Check Version:
Check Monitorr version in dashboard or examine version.txt file in installation directory.
Verify Fix Applied:
Verify _register.php file either doesn't exist or contains proper authentication checks. Test that unauthorized users cannot create accounts.
📡 Detection & Monitoring
Log Indicators:
- HTTP POST requests to /assets/config/_installation/_register.php
- Unusual user account creation events
- File uploads to Monitorr upload directories from unauthenticated sources
Network Indicators:
- POST requests to the vulnerable endpoint from unexpected sources
- Subsequent file upload requests following credential creation
SIEM Query:
source="web_server" AND (uri="/assets/config/_installation/_register.php" OR uri="/assets/php/upload.php") AND status=200
🔗 References
- http://packetstormsecurity.com/files/163263/Monitorr-1.7.6m-Bypass-Information-Disclosure-Shell-Upload.html
- https://lyhinslab.org/index.php/2020/09/12/how-the-white-box-hacking-works-authorization-bypass-and-remote-code-execution-in-monitorr-1-7-6/
- https://www.exploit-db.com/exploits/48981
- http://packetstormsecurity.com/files/163263/Monitorr-1.7.6m-Bypass-Information-Disclosure-Shell-Upload.html
- https://lyhinslab.org/index.php/2020/09/12/how-the-white-box-hacking-works-authorization-bypass-and-remote-code-execution-in-monitorr-1-7-6/
- https://www.exploit-db.com/exploits/48981