minor update

patch-4
Dhiyaneshwaran 2024-07-10 11:48:54 +05:30 committed by GitHub
parent 198f84c9b6
commit 06e4f39580
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 10 additions and 4 deletions

View File

@ -1,9 +1,9 @@
id: edusoho-lfi
id: CNVD-2023-03903
info:
name: EduSoho < v22.4.7 - Local File Inclusion
author: securityforeveryone
severity: critical
severity: high
description: |
The edusoho education and training system <v22.4.7 has unauthorized file reading vulnerability. Through this vulnerability, an attacker can read the contents of the config/parameters.yml file and obtain sensitive information such as the secret value saved in the file and database account password. After the secret value is obtained, an attacker can implement RCE with symfony _fragment routing.
reference:
@ -12,10 +12,10 @@ info:
metadata:
verified: true
max-request: 1
vendor: Hangzhou Kuozhi Network Technology
vendor: hagzhou-kuozhi-network-technology
product: edusoho
fofa-query: title="Powered By EduSoho" || body="Powered by <a href=\"http://www.edusoho.com/\" target=\"_blank\">EduSoho" || (body="Powered By EduSoho" && body="var app")
tags: EduSoho,classroom-course,CNVD-2023-03903,lfi
tags: cnvd,cnvd2023,lfi,edushoho
http:
- raw:
@ -26,9 +26,15 @@ http:
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- "root:.*:0:0:"
- type: word
part: content_type
words:
- "text/csv"
- type: status
status:
- 200