matcher and info update

patch-1
Ritik Chaddha 2023-09-18 23:47:32 +05:30 committed by GitHub
parent 82d46bb11d
commit 6335a4e3a0
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 10 additions and 4 deletions

View File

@ -1,18 +1,24 @@
id: CVE-2023-2766 id: CVE-2023-2766
info: info:
name: OA E-Office jx2_config.ini - Information Leakage name: Weaver OA 9.5 - Information Disclosure
author: DhiyaneshDK author: DhiyaneshDK
severity: high severity: high
description: | description: |
A vulnerability was found in Weaver OA 9.5 and classified as problematic. This issue affects some unknown processing of the file /building/backmgr/urlpage/mobileurl/configfile/jx2_config.ini. The manipulation leads to files or directories accessible. The attack may be initiated remotely. A vulnerability was found in Weaver OA 9.5 and classified as problematic. This issue affects some unknown processing of the file /building/backmgr/urlpage/mobileurl/configfile/jx2_config.ini. The manipulation leads to files or directories accessible. The attack may be initiated remotely.
reference: reference:
- https://github.com/8079048q/cve/blob/main/weaveroa.md - https://github.com/8079048q/cve/blob/main/weaveroa.md
- https://nvd.nist.gov/vuln/detail/CVE-2023-2766
classification:
cve-id: CVE-2023-2766
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-552
metadata: metadata:
max-request: 1 max-request: 1
fofa-query: app="泛微-EOffice"
verified: true verified: true
tags: cve,cve2023,e-office,info-leak fofa-query: app="泛微-EOffice"
tags: cve,cve2023,weaver,eoffice,exposure
http: http:
- method: GET - method: GET
@ -24,5 +30,5 @@ http:
dsl: dsl:
- 'status_code == 200' - 'status_code == 200'
- 'contains(header,"text/plain")' - 'contains(header,"text/plain")'
- 'contains(body,"sdbuser") && contains(body, "sdbpassword")' - 'contains_all(body, "sdbuser =","sdbpassword =")'
condition: and condition: and