CVE-2020-37082
Published: 03 February 2026
Description
webERP 4.15.1 contains an unauthenticated file access vulnerability that allows remote attackers to download database backup files without authentication. Attackers can directly access generated backup files in the companies/weberp/ directory by requesting the Backup_[timestamp].sql.gz file.
Mitigating Controls (NIST 800-53 r5)AI
AC-22 directly requires restricting access to publicly accessible content to authorized users, preventing unauthenticated remote downloads of sensitive database backup files.
AC-3 enforces approved authorizations for logical access to system resources such as files, blocking direct unauthenticated access to Backup_[timestamp].sql.gz files.
CM-6 mandates secure configuration settings for web servers to deny public access to directories containing sensitive backup files.
Security SummaryAI
CVE-2020-37082 is an unauthenticated file access vulnerability affecting webERP version 4.15.1. The flaw enables remote attackers to download database backup files without authentication by directly requesting files named Backup_[timestamp].sql.gz located in the companies/weberp/ directory. It is classified under CWE-552 (Files or Directories Accessible to External Parties) and carries a CVSS 3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Remote attackers require no privileges, authentication, or user interaction to exploit this vulnerability over the network with low complexity. Successful exploitation allows attackers to obtain database backups, potentially exposing sensitive data stored within them and enabling further compromise depending on the contents.
Advisories and resources include project sites at weberp.org and SourceForge, an Exploit-DB entry (48420) with a proof-of-concept, and a Vulncheck advisory detailing the unauthenticated backup file access. Security practitioners should review these references for patch information and mitigation guidance.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote access to database backup files via public-facing web application (T1190) due to externally accessible files from permissions weakness (T1044).