Update CVE-2021-39433.yaml

patch-1
Prince Chaddha 2022-01-24 12:28:03 +05:30 committed by GitHub
parent df907cc2e3
commit 03697ed21a
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 3 additions and 4 deletions

View File

@ -4,11 +4,12 @@ info:
name: BIQS IT Biqs-drive v1.83 LFI name: BIQS IT Biqs-drive v1.83 LFI
author: Veshraj author: Veshraj
severity: high severity: high
description: A local file inclusion (LFI) vulnerability exists in version BIQS IT Biqs-drive v1.83 and below when sending a specific payload as the file parameter to download/index.php. This allows the attacker to read arbitrary files from the server with the permissions of the configured web-user.
reference: reference:
- https://github.com/PinkDraconian/CVE-2021-39433/blob/main/README.md - https://github.com/PinkDraconian/CVE-2021-39433/blob/main/README.md
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39433 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39433
tags: lfi,Biqsdrive tags: lfi,biqsdrive,cve,cve2021
description: A local file inclusion (LFI) vulnerability exists in version BIQS IT Biqs-drive v1.83 and below when sending a specific payload as the file parameter to download/index.php. This allows the attacker to read arbitrary files from the server with the permissions of the configured web-user.
requests: requests:
- method: GET - method: GET
path: path:
@ -16,11 +17,9 @@ requests:
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
condition: and
- type: status - type: status
status: status: