minor update
parent
198f84c9b6
commit
06e4f39580
|
@ -1,9 +1,9 @@
|
|||
id: edusoho-lfi
|
||||
id: CNVD-2023-03903
|
||||
|
||||
info:
|
||||
name: EduSoho < v22.4.7 - Local File Inclusion
|
||||
author: securityforeveryone
|
||||
severity: critical
|
||||
severity: high
|
||||
description: |
|
||||
The edusoho education and training system <v22.4.7 has unauthorized file reading vulnerability. Through this vulnerability, an attacker can read the contents of the config/parameters.yml file and obtain sensitive information such as the secret value saved in the file and database account password. After the secret value is obtained, an attacker can implement RCE with symfony _fragment routing.
|
||||
reference:
|
||||
|
@ -12,10 +12,10 @@ info:
|
|||
metadata:
|
||||
verified: true
|
||||
max-request: 1
|
||||
vendor: Hangzhou Kuozhi Network Technology
|
||||
vendor: hagzhou-kuozhi-network-technology
|
||||
product: edusoho
|
||||
fofa-query: title="Powered By EduSoho" || body="Powered by <a href=\"http://www.edusoho.com/\" target=\"_blank\">EduSoho" || (body="Powered By EduSoho" && body="var app")
|
||||
tags: EduSoho,classroom-course,CNVD-2023-03903,lfi
|
||||
tags: cnvd,cnvd2023,lfi,edushoho
|
||||
|
||||
http:
|
||||
- raw:
|
||||
|
@ -26,9 +26,15 @@ http:
|
|||
matchers-condition: and
|
||||
matchers:
|
||||
- type: regex
|
||||
part: body
|
||||
regex:
|
||||
- "root:.*:0:0:"
|
||||
|
||||
- type: word
|
||||
part: content_type
|
||||
words:
|
||||
- "text/csv"
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
Loading…
Reference in New Issue