Dashboard Content Enhancements (#4927)

Dashboard Content Enhancements
patch-1
MostInterestingBotInTheWorld 2022-07-27 16:17:31 -04:00 committed by GitHub
parent 4f987317c6
commit 690da7dd94
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
23 changed files with 179 additions and 42 deletions

View File

@ -1,16 +1,20 @@
id: qnap-qts-panel id: qnap-qts-panel
info: info:
name: QNAP QTS Panel name: QNAP - QTS Panel Discovery
author: idealphase author: idealphase
severity: info severity: info
description: | description: |
Simple, Secure, Scalable & Reliable, Based on Linux, QTS 4 is designed to deliver high-performance applications and services fulfilling your needs in file sharing, storage management, backup, virtual environments, multimedia, surveillance and more. QNAP QTS Panel was discovered.
reference: reference:
- https://www.qnap.com/en/qts4/con_show.php?op=showone&cid=1 - https://www.qnap.com/en?ref=header_logo
metadata: metadata:
verified: true verified: true
shodan-query: product:"QNAP" shodan-query: product:"QNAP"
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200
tags: panel,qnap,qts tags: panel,qnap,qts
requests: requests:
@ -28,3 +32,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/07/27

View File

@ -1,13 +1,18 @@
id: git-config-nginxoffbyslash id: git-config-nginxoffbyslash
info: info:
name: Nginx off-by-slash exposes Git config name: Nginx - Git Configuration Exposure
author: organiccrap author: organiccrap
severity: medium severity: medium
description: Nginx off-by-slash vulnerability exposes Git configuration. description: Nginx is vulnerable to git configuration exposure.
reference: reference:
- https://beaglesecurity.com/blog/vulnerability/nginx-off-by-slash-exposes-git-config.html
- https://twitter.com/Random_Robbie/status/1262676628167110656 - https://twitter.com/Random_Robbie/status/1262676628167110656
- https://github.com/PortSwigger/nginx-alias-traversal/blob/master/off-by-slash.py - https://github.com/PortSwigger/nginx-alias-traversal/blob/master/off-by-slash.py
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cwe-id: CWE-200
tags: config,exposure,nginx tags: config,exposure,nginx
requests: requests:
@ -29,3 +34,5 @@ requests:
- type: word - type: word
words: words:
- '[core]' - '[core]'
# Enhanced by mp on 2022/07/26

View File

@ -1,16 +1,20 @@
id: elFinder-path-traversal id: elFinder-path-traversal
info: info:
name: elFinder - Path Traversal name: elFinder <=2.1.12 - Local File Inclusion
author: ritikchaddha author: ritikchaddha
severity: high severity: high
description: | description: |
Connector.minimal.php in std42 elFinder through 2.1.12 is affected by path traversal. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths. elFinder through 2.1.12 is vulnerable to local file inclusion via Connector.minimal.php in std42. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths.
reference: reference:
- https://www.synacktiv.com/publications/elfinder-the-story-of-a-repwning.html - https://www.synacktiv.com/publications/elfinder-the-story-of-a-repwning.html
metadata: metadata:
verified: true verified: true
shodan-query: title:"elfinder" shodan-query: title:"elfinder"
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
tags: lfi,elfinder tags: lfi,elfinder
requests: requests:
@ -29,3 +33,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/07/26

View File

@ -1,12 +1,16 @@
id: ewebs-arbitrary-file-reading id: ewebs-arbitrary-file-reading
info: info:
name: EWEBS casmain.xgi arbitrary file reading vulnerability name: EWEBS - Local File Inclusion
author: pikpikcu author: pikpikcu
severity: high severity: high
description: A vulnerability in EWEBS's 'casmain.xgi' endpoint allows remote attackers to disclose the content of locally stored files via the 'Language_S' parameter. description: EWEBS is vulnerable to local file inclusion and allows remote attackers to disclose the content of locally stored files via the 'Language_S' parameter supplied to the 'casmain.xgi' endpoint.
reference: reference:
- http://wiki.peiqi.tech/PeiQi_Wiki/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/%E6%9E%81%E9%80%9AEWEBS/%E6%9E%81%E9%80%9AEWEBS%20casmain.xgi%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.html - http://wiki.peiqi.tech/PeiQi_Wiki/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/%E6%9E%81%E9%80%9AEWEBS/%E6%9E%81%E9%80%9AEWEBS%20casmain.xgi%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.html
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
tags: ewebs,lfi tags: ewebs,lfi
requests: requests:
@ -30,3 +34,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/07/27

View File

@ -1,12 +1,17 @@
id: feifeicms-lfr id: feifeicms-lfr
info: info:
name: FeiFeiCms Local File Read name: FeiFeiCms - Local File Inclusion
author: princechaddha author: princechaddha
severity: high severity: high
description: FeiFeiCms is vulnerable to local file inclusion.
reference: reference:
- https://www.cnblogs.com/jinqi520/p/10202615.html - https://www.cnblogs.com/jinqi520/p/10202615.html
- https://gitee.com/daicuo/feifeicms - https://gitee.com/daicuo/feifeicms
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
tags: feifeicms,lfi tags: feifeicms,lfi
requests: requests:
@ -28,3 +33,5 @@ requests:
- "db_host" - "db_host"
condition: and condition: and
part: body part: body
# Enhanced by mp on 2022/07/27

View File

@ -1,11 +1,16 @@
id: finereport-path-traversal id: finereport-path-traversal
info: info:
name: FineReport 8.0 Path Traversal name: FineReport 8.0 - Local File Inclusion
author: pikpikcu author: pikpikcu
severity: medium severity: medium
description: FIneReport 8.0 is vulnerable to local file inclusion.
reference: reference:
- http://foreversong.cn/archives/1378 - http://foreversong.cn/archives/1378
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
tags: finereport,lfi tags: finereport,lfi
requests: requests:
@ -26,3 +31,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/07/27

View File

@ -1,11 +1,16 @@
id: flir-path-traversal id: flir-path-traversal
info: info:
name: Flir Path Traversal name: Flir - Local File Inclusion
author: pikpikcu author: pikpikcu
severity: high severity: high
description: Flir is vulnerable to local file inclusion.
reference: reference:
- https://juejin.cn/post/6961370156484263972 - https://juejin.cn/post/6961370156484263972
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
tags: flir,lfi tags: flir,lfi
requests: requests:
@ -24,3 +29,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/07/27

View File

@ -1,12 +1,16 @@
id: geowebserver-lfi id: geowebserver-lfi
info: info:
name: GeoVision Geowebserver 5.3.3 - LFI name: GeoVision Geowebserver 5.3.3 - Local File Inclusion
author: madrobot author: madrobot
severity: high severity: high
description: A vulnerability in GeoVision Geowebserver allows remote unauthenticated attackers to disclose the content of locally stored files. description: GeoVision Geowebserver 5.3.3 allows remote unauthenticated attackers to disclose the content of locally stored files via local file inclusion.
reference: reference:
- https://packetstormsecurity.com/files/163860/geovisiongws533-lfixssxsrfexec.txt - https://packetstormsecurity.com/files/163860/geovisiongws533-lfixssxsrfexec.txt
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
tags: geowebserver,lfi tags: geowebserver,lfi
requests: requests:
@ -29,3 +33,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/07/27

View File

@ -1,12 +1,16 @@
id: geowebserver-xss id: geowebserver-xss
info: info:
name: GeoVision Geowebserver 5.3.3 - XSS name: GeoVision Geowebserver 5.3.3 - Cross-Site Scripting
author: madrobot author: madrobot
severity: medium severity: medium
description: GEOVISION GEOWEBSERVER =< 5.3.3 are vulnerable to several XSS / HTML Injection / Local File Include / XML Injection / Code execution vectors. The application fails to properly sanitize user requests. description: GeoVision Geowebserver 5.3.3 and prior versions are vulnerable to several cross-site scripting / HTML injection / local file inclusion / XML injection / code execution vectors because the application fails to properly sanitize user requests.
reference: reference:
- https://packetstormsecurity.com/files/163860/geovisiongws533-lfixssxsrfexec.txt - https://packetstormsecurity.com/files/163860/geovisiongws533-lfixssxsrfexec.txt
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
tags: geowebserver,xss tags: geowebserver,xss
requests: requests:
@ -32,3 +36,5 @@ requests:
part: header part: header
words: words:
- text/html - text/html
# Enhanced by mp on 2022/07/27

View File

@ -1,12 +1,17 @@
id: global-domains-lfi id: global-domains-lfi
info: info:
name: Global Domains International Directory traversal Vulnerability name: Global Domains International - Local File Inclusion
author: 0x_Akoko author: 0x_Akoko
severity: high severity: high
description: Global Domains International is vulnerable to local file inclusion.
reference: reference:
- https://cxsecurity.com/issue/WLB-2018020247 - https://cxsecurity.com/issue/WLB-2018020247
- http://www.nic.ws - http://www.nic.ws
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
tags: globaldomains,lfi,traversal tags: globaldomains,lfi,traversal
requests: requests:
@ -23,3 +28,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/07/27

View File

@ -4,12 +4,15 @@ info:
name: GoIP-1 GSM - Local File Inclusion name: GoIP-1 GSM - Local File Inclusion
author: gy741 author: gy741
severity: high severity: high
description: Input passed thru the 'content' or 'sidebar' GET parameter in 'frame.html' or 'frame.A100.html' not properly sanitized before being used to read files. This can be exploited by an unauthenticated attacker description: GoIP-1 GSM is vulnerable to local file inclusion because input passed thru the 'content' or 'sidebar' GET parameter in 'frame.html' or 'frame.A100.html' is not properly sanitized before being used to read files. This can be exploited by an unauthenticated attacker to read arbitrary files on the affected system.
to read arbitrary files on the affected system.
reference: reference:
- https://shufflingbytes.com/posts/hacking-goip-gsm-gateway/ - https://shufflingbytes.com/posts/hacking-goip-gsm-gateway/
- http://www.hybertone.com/uploadfile/download/20140304125509964.pdf - http://www.hybertone.com/uploadfile/download/20140304125509964.pdf
- http://en.dbltek.com/latestfirmwares.html - http://en.dbltek.com/latestfirmwares.html
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
tags: gsm,goip,lfi,iot tags: gsm,goip,lfi,iot
requests: requests:
@ -22,3 +25,5 @@ requests:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0:" - "root:.*:0:0:"
# Enhanced by mp on 2022/07/27

View File

@ -1,12 +1,17 @@
id: groupoffice-lfi id: groupoffice-lfi
info: info:
name: Groupoffice 3.4.21 Directory Traversal Vulnerability name: Groupoffice 3.4.21 - Local File Inclusion
author: 0x_Akoko author: 0x_Akoko
severity: high severity: high
description: Groupoffice 3.4.21 is vulnerable to local file inclusion.
reference: reference:
- https://cxsecurity.com/issue/WLB-2018020249 - https://cxsecurity.com/issue/WLB-2018020249
- http://www.group-office.com - http://www.group-office.com
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
tags: groupoffice,lfi,traversal tags: groupoffice,lfi,traversal
requests: requests:
@ -24,3 +29,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/07/27

View File

@ -1,11 +1,16 @@
id: gsoap-lfi id: gsoap-lfi
info: info:
name: gSOAP 2.8 - Directory Traversal name: gSOAP 2.8 - Local File Inclusion
author: 0x_Akoko author: 0x_Akoko
description: gSOAP 2.8 is vulnerable to local file inclusion.
severity: high severity: high
reference: reference:
- https://www.exploit-db.com/exploits/47653 - https://www.exploit-db.com/exploits/47653
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
tags: gsoap,lfi tags: gsoap,lfi
requests: requests:
@ -27,3 +32,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/07/27

View File

@ -1,11 +1,16 @@
id: hanming-lfr id: hanming-lfr
info: info:
name: Hanming Video Conferencing File Read name: Hanming Video Conferencing - Local File Inclusion
author: ritikchaddha author: ritikchaddha
severity: high severity: high
description: Hanming Video Conferencing is vulnerable to local file inclusion.
reference: reference:
- https://mp.weixin.qq.com/s/F-M21PT0xn9QOuwoC8llKA - https://mp.weixin.qq.com/s/F-M21PT0xn9QOuwoC8llKA
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
tags: lfr,hanming,lfi tags: lfr,hanming,lfi
requests: requests:
@ -28,3 +33,5 @@ requests:
- type: regex - type: regex
regex: regex:
- "root:[x*]:0:0:" - "root:[x*]:0:0:"
# Enhanced by mp on 2022/07/27

View File

@ -1,11 +1,16 @@
id: hjtcloud-arbitrary-file-read id: hjtcloud-arbitrary-file-read
info: info:
name: HJTcloud Arbitrary File Read name: HJTcloud - Local File Inclusion
author: pikpikcu author: pikpikcu
severity: high severity: high
description: HJTcloud is vulnerable to local file inclusion.
reference: reference:
- https://mp.weixin.qq.com/s/w2pkj5ADN7b5uxe-wmfGbw - https://mp.weixin.qq.com/s/w2pkj5ADN7b5uxe-wmfGbw
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
tags: hjtcloud,lfi tags: hjtcloud,lfi
requests: requests:
@ -38,3 +43,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/07/27

View File

@ -4,6 +4,7 @@ info:
name: UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read name: UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read
author: hackerarpan author: hackerarpan
severity: high severity: high
description: UniSharp Larevel File Manager 2.0.0 is vulnerable to arbitrary file read.
reference: reference:
- https://www.exploit-db.com/exploits/48166 - https://www.exploit-db.com/exploits/48166
- https://github.com/UniSharp/laravel-filemanager - https://github.com/UniSharp/laravel-filemanager
@ -27,3 +28,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/07/27

View File

@ -1,19 +1,14 @@
id: mcafee-epo-rce id: mcafee-epo-rce
info: info:
name: McAfee ePolicy Orchestrator RCE name: McAfee ePolicy Orchestrator - Arbitrary File Upload
author: dwisiswant0 author: dwisiswant0
severity: high severity: high
description: | description: |
A ZipSlip vulnerability in McAfee ePolicy Orchestrator (ePO) McAfee ePolicy Orchestrator (ePO) is vulnerable to a ZipSlip vulnerability which allows arbitrary file upload when archives are unpacked if the names of the packed files are not properly sanitized. An attacker can create archives with files containing "../" in their names, making it possible to upload arbitrary files to arbitrary directories or overwrite existing ones during archive extraction.
is a type of Path Traversal occurring when archives are unpacked
if the names of the packed files are not properly sanitized.
An attacker can create archives with files containing "../" in their names,
making it possible to upload arbitrary files
to arbitrary directories or overwrite existing ones during archive extraction.
reference: reference:
- https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/ - https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/
tags: mcafee,rce tags: mcafee,rce,
requests: requests:
- method: GET - method: GET
@ -32,3 +27,5 @@ requests:
regex: regex:
- "Volume (in drive [A-Z]|Serial Number) is" - "Volume (in drive [A-Z]|Serial Number) is"
part: body part: body
# Enhanced by mp on 2022/07/27

View File

@ -1,12 +1,16 @@
id: metinfo-lfi id: metinfo-lfi
info: info:
name: MetInfo 6.0.0/6.1.0 LFI name: MetInfo <=6.1.0 - Local File Inclusion
author: pikpikcu author: pikpikcu
severity: high severity: high
description: A vulnerability in MetInfo allows remote unauthenticated attackers access to locally stored files and their content. description: MetInfo 6.0.0 through 6.1.0 is vulnerable to local file inclusion and allows remote unauthenticated attackers access to locally stored files and their content.
reference: reference:
- https://paper.seebug.org/676/ - https://paper.seebug.org/676/
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
tags: metinfo,lfi tags: metinfo,lfi
requests: requests:
@ -30,3 +34,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/07/27

View File

@ -1,12 +1,16 @@
id: minimouse-lfi id: minimouse-lfi
info: info:
name: Mini Mouse 9.2.0 - Path Traversal name: Mini Mouse 9.2.0 - Local File Inclusion
author: 0x_Akoko author: 0x_Akoko
severity: high severity: high
description: A vulnerability in Mini Mouse allows remote unauthenticated attackers to include and disclose the content of locally stored files via the 'file' parameter. description: Mini Mouse 9.2.0 is vulnerable to local file inclusion because it allows remote unauthenticated attackers to include and disclose the content of locally stored files via the 'file' parameter.
reference: reference:
- https://www.exploit-db.com/exploits/49744 - https://www.exploit-db.com/exploits/49744
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
tags: minimouse,lfi tags: minimouse,lfi
requests: requests:
@ -27,3 +31,5 @@ requests:
- "extensions" - "extensions"
condition: and condition: and
part: body part: body
# Enhanced by mp on 2022/07/27

View File

@ -1,11 +1,16 @@
id: mpsec-lfi id: mpsec-lfi
info: info:
name: MPSec ISG1000 Local File Read name: MPSec ISG1000 - Local File Inclusion
author: pikpikcu author: pikpikcu
severity: high severity: high
description: MPSec ISG1000 is vulnerable to local file inclusion.
reference: reference:
- https://twitter.com/sec715/status/1402884871173795842 - https://twitter.com/sec715/status/1402884871173795842
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
tags: mpsec,lfi tags: mpsec,lfi
requests: requests:
@ -31,3 +36,5 @@ requests:
words: words:
- "text/plain" - "text/plain"
part: header part: header
# Enhanced by mp on 2022/07/27

View File

@ -1,11 +1,16 @@
id: myucms-lfr id: myucms-lfr
info: info:
name: MyuCMS Local File Read name: MyuCMS - Local File Inclusion
author: princechaddha author: princechaddha
severity: high severity: high
description: MyuCMS is vulnerable to local file inclusion.
reference: reference:
- https://blog.csdn.net/yalecaltech/article/details/104908257 - https://blog.csdn.net/yalecaltech/article/details/104908257
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
tags: myucms,lfi tags: myucms,lfi
requests: requests:
@ -16,3 +21,5 @@ requests:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0:" - "root:.*:0:0:"
# Enhanced by mp on 2022/07/27

View File

@ -1,11 +1,16 @@
id: natshell-path-traversal id: natshell-path-traversal
info: info:
name: NatShell Path Traversal name: NatShell - Local File Inclusion
author: pikpikcu author: pikpikcu
severity: high severity: high
description: NatShell is vulnerable to local file inclusion.
reference: reference:
- https://mp.weixin.qq.com/s/g4YNI6UBqIQcKL0TRkKWlw - https://mp.weixin.qq.com/s/g4YNI6UBqIQcKL0TRkKWlw
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
metadata: metadata:
fofa-query: title="蓝海卓越计费管理系统" fofa-query: title="蓝海卓越计费管理系统"
tags: natshell,lfi tags: natshell,lfi
@ -25,3 +30,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/07/27

View File

@ -1,13 +1,17 @@
id: nginx-merge-slashes-path-traversal id: nginx-merge-slashes-path-traversal
info: info:
name: Nginx Merge Slashes Path Traversal name: Nginx Server - Local File Inclusion
author: dhiyaneshDk author: dhiyaneshDk
severity: medium severity: medium
description: A vulnerability in the remote Nginx server could cause the server to merge slashslash together causing what should have protected the web site from a directory traversal vulnerability into a vulnerable server. description: Nginx server is vulnerable to local file inclusion.
reference: reference:
- https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/nginx-merge-slashes-path-traversal.json - https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/nginx-merge-slashes-path-traversal.json
- https://medium.com/appsflyer/nginx-may-be-protecting-your-applications-from-traversal-attacks-without-you-even-knowing-b08f882fd43d - https://medium.com/appsflyer/nginx-may-be-protecting-your-applications-from-traversal-attacks-without-you-even-knowing-b08f882fd43d
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
tags: exposure,config,lfi,nginx tags: exposure,config,lfi,nginx
requests: requests:
@ -31,3 +35,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/07/27