CVE-2020-37104

7.5 HIGH

📋 TL;DR

CVE-2020-37104 allows unauthenticated attackers to download database backup files from ASTPP VoIP billing software by brute-forcing predictable 6-digit PIN filenames. This exposes sensitive database information including credentials, call records, and billing data. All ASTPP 4.0.1 installations with default configurations are affected.

💻 Affected Systems

Products:
  • ASTPP (Open Source VoIP Billing Solution)
Versions: 4.0.1
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation with database backup feature enabled. The /database_backup/ directory is accessible without authentication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database exfiltration including administrator credentials, customer data, call records, financial information, and system configuration leading to full system compromise and data breach.

🟠

Likely Case

Attackers download database backups containing sensitive information, potentially leading to credential theft, data exposure, and further system compromise.

🟢

If Mitigated

Limited exposure with only partial backup files accessible or no successful downloads due to access controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code available on Exploit-DB (47900). Attack involves simple HTTP requests to guess 6-digit PIN backup filenames.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ASTPP 4.0.2 and later

Vendor Advisory: https://github.com/iNextrix/ASTPP

Restart Required: No

Instructions:

1. Upgrade to ASTPP 4.0.2 or later. 2. Download latest version from official repository. 3. Follow upgrade instructions in documentation. 4. Verify backup directory access controls are properly implemented.

🔧 Temporary Workarounds

Restrict access to backup directory

linux

Block unauthenticated access to /database_backup/ directory using web server configuration

# For Apache: add to .htaccess or virtual host config
<Location /database_backup/>
    Require all denied
</Location>
# For Nginx: add to server block
location /database_backup/ {
    deny all;
}

Remove or secure backup files

linux

Delete existing backup files or move them outside web root

# Move backup files to secure location
mv /var/www/html/database_backup/* /secure/backup/location/
# Delete backup files
rm -rf /var/www/html/database_backup/*

🧯 If You Can't Patch

  • Implement strict network access controls to limit access to ASTPP web interface
  • Deploy web application firewall (WAF) rules to block requests to /database_backup/ patterns

🔍 How to Verify

Check if Vulnerable:

Attempt to access http://[astpp-server]/database_backup/backup_000000.sql with various 6-digit PINs. If any backup file downloads without authentication, system is vulnerable.

Check Version:

Check ASTPP version in web interface admin panel or examine ASTPP source files for version information

Verify Fix Applied:

Verify upgrade to ASTPP 4.0.2+ and test that /database_backup/ directory returns 403 Forbidden or redirects to login for unauthenticated requests.

📡 Detection & Monitoring

Log Indicators:

  • Multiple 403/404 requests to /database_backup/ patterns
  • Successful downloads of .sql files from backup directory
  • Unusual traffic patterns with sequential 6-digit numbers in URLs

Network Indicators:

  • HTTP GET requests to /database_backup/backup_[0-9]{6}.sql
  • Large outbound transfers of .sql files from web server

SIEM Query:

source="web_logs" AND (url="/database_backup/*" OR url LIKE "/database_backup/backup_%") AND (response_code=200 OR bytes_out>1000000)

🔗 References

📤 Share & Export