nuclei-templates/http/cves/2023/CVE-2023-37645.yaml

50 lines
1.5 KiB
YAML
Raw Permalink Normal View History

2024-06-15 18:29:20 +00:00
id: CVE-2023-37645
info:
2024-06-18 10:12:13 +00:00
name: EyouCms v1.6.3 - Information Disclosure
2024-06-15 18:29:20 +00:00
author: pussycat0x
severity: medium
2024-06-18 10:12:13 +00:00
description: |
EyouCms v1.6.3 was discovered to contain an information disclosure vulnerability via the component /custom_model_path/recruit.filelist.txt.
2024-06-15 18:29:20 +00:00
impact: |
An attacker can exploit this vulnerability to gain sensitive information.
remediation: |
Upgrade eYouCMS to a patched version to mitigate CVE-2023-37645.
reference:
- https://github.com/weng-xianhu/eyoucms/issues/50
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2023-37645
cwe-id: CWE-668
epss-score: 0.00046
2024-06-16 00:38:42 +00:00
epss-percentile: 0.16551
2024-06-15 18:29:20 +00:00
cpe: cpe:2.3:a:eyoucms:eyoucms:1.6.3:*:*:*:*:*:*:*
metadata:
2024-06-16 00:38:42 +00:00
verified: true
max-request: 1
2024-06-15 18:29:20 +00:00
vendor: eyoucms
product: eyoucms
2024-06-16 00:38:42 +00:00
fofa-query:
- icon_hash="-614262549"
- title="eyoucms"
tags: cve,cve2023,info-leak,eyoucms
2024-06-15 18:29:20 +00:00
http:
- method: GET
path:
- "{{BaseURL}}/data/model/custom_model_path/recruit.filelist.txt"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "application/admin/"
- "template/pc/"
2024-06-16 00:38:42 +00:00
condition: and
2024-06-15 18:29:20 +00:00
- type: status
status:
- 200
# digest: 490a004630440220620da377352c608f59801114789cee026e742c72f94cc0583128ca38ab31e2e4022021626755b2037d0e95080ef1d8bd13f1418bdafec82dccfeeab84038aa666f6f:922c64590222798bb761d5b6d8e72950