CVE-2020-5676
📋 TL;DR
CVE-2020-5676 is an information disclosure vulnerability in GROWI wiki software that allows remote attackers to access unauthorized information through unspecified vectors. This affects all GROWI installations running version 4.1.3 or earlier. Attackers can potentially view sensitive data that should be restricted based on user permissions.
💻 Affected Systems
- GROWI
📦 What is this software?
Growi by Weseek
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access sensitive organizational information, user credentials, private documents, or configuration data that could lead to further compromise.
Likely Case
Unauthorized access to restricted pages, user information, or internal documentation that should be protected by access controls.
If Mitigated
Limited exposure of non-critical information if proper network segmentation and access controls are implemented.
🎯 Exploit Status
The vulnerability allows remote exploitation without authentication, though specific exploit vectors are not publicly documented.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v4.1.4 and later
Vendor Advisory: https://jvn.jp/en/jp/JVN56450373/index.html
Restart Required: Yes
Instructions:
1. Update GROWI to version 4.1.4 or later. 2. For Docker deployments: pull latest image from weseek/growi. 3. Restart the GROWI service. 4. Verify the update was successful.
🔧 Temporary Workarounds
Network Access Restriction
linuxRestrict network access to GROWI instances to only trusted IP addresses
iptables -A INPUT -p tcp --dport 3000 -s trusted_ip_range -j ACCEPT
iptables -A INPUT -p tcp --dport 3000 -j DROP
🧯 If You Can't Patch
- Implement strict network segmentation and firewall rules to limit access to GROWI instances
- Monitor GROWI access logs for unusual patterns and unauthorized access attempts
🔍 How to Verify
Check if Vulnerable:
Check GROWI version in admin panel or via API endpoint /api/v3/version
Check Version:
curl -s http://growi-host:3000/api/v3/version | grep version
Verify Fix Applied:
Confirm version is 4.1.4 or later and test access controls on restricted content
📡 Detection & Monitoring
Log Indicators:
- Multiple failed access attempts to restricted pages
- Unauthorized users accessing protected content
- Unusual access patterns from external IPs
Network Indicators:
- Unusual traffic to GROWI API endpoints from unauthorized sources
- Requests bypassing normal authentication flows
SIEM Query:
source="growi" AND (event="unauthorized_access" OR status="403")