6.5

CVE-2020-16171

Exploit

An issue was discovered in Acronis Cyber Backup before 12.5 Build 16342. Some API endpoints on port 9877 under /api/ams/ accept an additional custom Shard header. The value of this header is afterwards used in a separate web request issued by the application itself. This can be abused to conduct SSRF attacks against otherwise unreachable Acronis services that are bound to localhost such as the NotificationService on 127.0.0.1:30572.

Data is provided by the National Vulnerability Database (NVD)
AcronisCyber Backup Version <= 12.5
AcronisCyber Backup Version12.5 Update-
AcronisCyber Backup Version12.5 Update10130
AcronisCyber Backup Version12.5 Update10330
AcronisCyber Backup Version12.5 Update11010
AcronisCyber Backup Version12.5 Update13160
AcronisCyber Backup Version12.5 Update13400
AcronisCyber Backup Version12.5 Update14280
AcronisCyber Backup Version12.5 Update14330
AcronisCyber Backup Version12.5 Update16180
AcronisCyber Backup Version12.5 Update16318
AcronisCyber Backup Version12.5 Update16327
AcronisCyber Backup Version12.5 Update7641
AcronisCyber Backup Version12.5 Update7970
AcronisCyber Backup Version12.5 Update8850
AcronisCyber Backup Version12.5 Update9010
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 11.24% 0.932
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.5 3.9 2.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
nvd@nist.gov 6.4 10 4.9
AV:N/AC:L/Au:N/C:P/I:P/A:N
CWE-918 Server-Side Request Forgery (SSRF)

The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.