From 01995c82ab2a0577416d93d17b2ad4891c1e4ce1 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Fri, 28 May 2021 09:26:30 +0530 Subject: [PATCH] misc changes --- cves/2020/CVE-2020-35736.yaml | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/cves/2020/CVE-2020-35736.yaml b/cves/2020/CVE-2020-35736.yaml index 524225d918..ef1f03d2b5 100644 --- a/cves/2020/CVE-2020-35736.yaml +++ b/cves/2020/CVE-2020-35736.yaml @@ -1,13 +1,14 @@ id: CVE-2020-35736 info: - name: GateOne LFI + name: GateOne Arbitrary File Download author: pikpikcu severity: high + description: GateOne 1.1 allows arbitrary file download without authentication via /downloads/.. directory traversal because os.path.join is misused. reference: | - https://github.com/liftoff/GateOne/issues/747 - - https://twitter.com/sec715/status/1397900990901223429 - tags: gateone,lfi + - https://nvd.nist.gov/vuln/detail/CVE-2020-35736 + tags: cve,cve2020,gateone,lfi requests: - method: GET @@ -22,4 +23,4 @@ requests: - type: status status: - - 200 + - 200 \ No newline at end of file