From 0fd1574fe272bf58198d918c8429a5a001571bad Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 17 Oct 2021 15:52:26 +0300 Subject: [PATCH] Add description --- vulnerabilities/other/ewebs-arbitrary-file-reading.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/ewebs-arbitrary-file-reading.yaml b/vulnerabilities/other/ewebs-arbitrary-file-reading.yaml index e83d14ce2c..60ae8e5789 100644 --- a/vulnerabilities/other/ewebs-arbitrary-file-reading.yaml +++ b/vulnerabilities/other/ewebs-arbitrary-file-reading.yaml @@ -4,6 +4,7 @@ info: name: EWEBS casmain.xgi arbitrary file reading vulnerability author: pikpikcu severity: high + description: A vulnerability in EWEBS's 'casmain.xgi' endpoint allows remote attackers to disclose the content of locally stored files via the 'Language_S' parameter. reference: http://wiki.peiqi.tech/PeiQi_Wiki/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/%E6%9E%81%E9%80%9AEWEBS/%E6%9E%81%E9%80%9AEWEBS%20casmain.xgi%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.html tags: ewebs,lfi