diff --git a/vulnerabilities/other/oliver-library-server-lfi.yaml b/vulnerabilities/other/oliver-library-lfi.yaml similarity index 82% rename from vulnerabilities/other/oliver-library-server-lfi.yaml rename to vulnerabilities/other/oliver-library-lfi.yaml index 4d84eb76dc..847d04b8a5 100644 --- a/vulnerabilities/other/oliver-library-server-lfi.yaml +++ b/vulnerabilities/other/oliver-library-lfi.yaml @@ -1,11 +1,13 @@ -id: oliver-library-server-lfi +id: oliver-library-lfi info: name: Oliver Library Server v5 - Arbitrary File Download author: gy741 severity: high description: An arbitrary file download vulnerability in Oliver v5 Library Server Versions < 8.00.008.053 via the FileServlet function allows for arbitrary file download by an attacker using unsanitized user supplied input. - reference: https://www.exploit-db.com/exploits/50599 + reference: + - https://www.exploit-db.com/exploits/50599 + - https://www.softlinkint.com/product/oliver/ tags: windows,lfi,oliver requests: